Extensible resource messaging in a communication network is provided through creation of a flexible, extensible, and secure messaging environment. A client-server architecture may be implemented in which user applications employ messaging clients to send resource requests for network information, allocation and other operations and receive resource responses, and in which network elements, through resource agents, may use messaging servers to accept resource requests and return resource responses. Resource agents in different network domains may interact through the messaging environment and work together to fulfill resource requests. An XML-based messaging mechanism may be built with a defined message format that can provide flexible message contexts. Network resource semantics may be specified using XML schemas so that network resources are expressed as resource-specific XML elements and network updates can be implemented by updating the XML resource schemas. Secure enhancements may be realized by secure transport, message verification and other
https://www.google.com/patents/US20060075042?dq=20060075042&hl=en&sa=X&ei=TOFVVJXQFpeUuASlt4GQAw&ved=0CB8Q6AEwAA
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users; this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, we presenedt a simulation study to measure the performance of several scheduling algorithms in WiMAX, which were Strict Priority algorithm, Round-Robin (RR), Weighted Round Robin (WRR), Weighted Fair Queuing (WFQ), Self-Clocked Fair (SCF), and Diff-Serv Algorithm.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of Quality of Services (QoS), which in turn were defined by IEEE 802.16 standard. Scheduling in WiMAX became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users; this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, we presenedt a simulation study to measure the performance of several scheduling algorithms in WiMAX, which were Strict Priority algorithm, Round-Robin (RR), Weighted Round Robin (WRR), Weighted Fair Queuing (WFQ), Self-Clocked Fair (SCF), and Diff-Serv Algorithm.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
Mobile computing devices equipped with transceivers form Mobile Ad Hoc Networks (MANET)
when two or more of these devices find themselves within transmission range. MANETs are
stand-alone (no existing infrastructure needed), autonomous networks that utilise multi-hop
communication to reach nodes out of transmitter range. Unlike infrastructure networks e.g. the
Internet with fixed topology, MANETs are dynamic. Despite the heterogeneous nature of these
two networks, integrating MANETs with the Internet extends the network coverage and adds to
the application domain of MANETs. One of the many ways of combining MANETs with the
Internet involves using Mobile Internet Protocol (Mobile IP) and a MANET protocol to route
packets between the Internet and the MANET via Gateway agents. In this paper, we evaluate the
performance of Mobile IP on MANET in Network Simulator 2 (NS2). We have implemented
Mobile IP on Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multiple
Distance Vector (AOMDV) and Destination-Sequenced Distance Vector (DSDV) routing
protocols and compared performances based on Throughput, End-to-End Delay (E2ED),
Packet Delivery Ratio (PDR) and Normalized Packet Ratio (NPR). The simulation results
suggest that on-demand routing within the MANET better serves Mobile IP on MANETs.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US20090279562?dq=20090279562&hl=en&sa=X&ei=FMtTVMy2M4PPmwXo3oCgDQ&ved=0CB8Q6AEwAA
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network. Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
https://www.google.com/patents/US20050076336?dq=20050076336&hl=en&sa=X&ei=e-JVVOb3J8G0uATNmILgAQ&ved=0CB8Q6AEwAA
Method and apparatus for automated negotiation for resources on a switched un...Tal Lavian Ph.D.
A resource negotiation service is provided to enable business logic decisions to be made when obtaining switched underlay network resources, to interface business logic with network conditions and schedules. The resource negotiation service may be implemented as a web service or other network service to enable business logic to be used in the selection of available network resources. This may allow policy to be used on both the subscriber side and the network provider side to optimize network resource allocations for a proposed transfer. The policy may include subscriber policy, network policy, and other factors such as current and expected network conditions. The resource negotiation service may include an interface to enable existing subscribers and new customers to obtain switched underlay resources.
https://www.google.com/patents/US20050076339?dq=20050076339&hl=en&sa=X&ei=8eFVVKDeHsOIuAT2soCAAg&ved=0CB8Q6AEwAA
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7944827?dq=US+7944827&hl=en&sa=X&ei=-XJSVPLjF8Kn8AXtz4G4Cw&ved=0CB8Q6AEwAA
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
We realize an open, programmable paradigm for application-driven network control by way of a novel network plane — the “service plane” — layered above legacy networks. The service plane bridges domains, establishes trust, and exposes control to credited users/applications while preventing unauthorized access and resource theft. The Authentication, Authorization, Accounting subsystem and the Dynamic Resource Allocation Controller are the two defining building blocks of our service plane. In concert, they act upon an interconnection request or a restoration request according to application requirements, security credentials, and domain-resident policy. We have experimented with such service
plane in an optical, large-scale testbed featuring two hubs (NetherLight in Amsterdam, StarLight in Chicago) and attached network clouds, each representing an independent domain. The dynamic interconnection of the heterogeneous domains occurred at Layer 1. The interconnections ultimately resulted in an optical end-to-end path (lightpath) for use by the
requesting Grid application.
Method and apparatus for live streaming media replication in a communication ...Tal Lavian Ph.D.
Replication of live streaming media services (SMS) in a communication network may be enabled by introducing the streaming media-savvy replication service on a network element, through a number of functions such as client/service registration and classification, packet interception and forwarding, media replication, status monitoring and configuration management. In an embodiment, client requests and server replies of an SMS are intercepted and evaluated by the network element. If the SMS is not streaming through the network element, the replication service registers the SMS and establishes a unique SMS session for the requesting clients. If the SMS is already streaming through the network element, the replication service replicates the streaming media and forwards it to the requesting clients. This reduces bandwidth usage on the links connecting the streaming media server with the network element and reduces the number of client connections to the streaming media provider's servers.
https://www.google.com/patents/US20050076099?dq=20050076099&hl=en&sa=X&ei=RONVVKPrLNefugSgnILwAQ&ved=0CB8Q6AEwAA
Embodiments of the invention provide methods and systems for optimizing network connections by a computing device. One or more network connections between a source and a destination may be monitored for one or more values of one or more connection parameters. Thereafter, one or more values of the connection parameters of the monitored network connections may be analyzed to select one or more combinations of the values. Further, the selected combinations of the values of the connection parameters may be stored. Subsequently, one or more monitored network connections may be established based on the stored values of the combinations.
https://www.google.com/patents/US20100220616?dq=20100220616&hl=en&sa=X&ei=68hTVNmbLYPAmwWb2oAg&ved=0CB8Q6AEwAA
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Network elements that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service, new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements so that malicious code may be filtered on the network before it reaches the end users. The filter rules may be derived by security software resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements that are to be implemented as detection points on the network.
https://www.google.com/patents/US20060123481?dq=20060123481&hl=en&sa=X&ei=AOFVVMCVB4i2uATUyoL4AQ&ved=0CB8Q6AEwAA
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Evaluation of load balancing algorithms on overlappiing wireless accesspointsnooriasukmaningtyas
Wireless networks came into the computing world replacing the costlier and
more complex wired method of connecting numerous equipment in the same
or different location via the use of cables. It provides the user devices a
connection to one another and the greater internet via connections to access
points. Generally, 802.11 access point products follow a default strongest
signal first approach in selecting user devices or nodes to connect to the
access point or overlapping access points. This standard does not make
provisions for even distribution of load and hence the quality of service and
the throughput in areas of congestion would be reduced. This article brings
forward two algorithms used in load balancing and they include round-robin
technique and the weighted round-robin technique to be used in the
simulation of the distribution of the load amongst the access points with the
results collated and compared to clearly show which algorithm is best suited
to be used as a standard for access point load distribution.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7580349?dq=US+7580349&hl=en&sa=X&ei=DXVSVID-EoTc8AW-_IDwBw&ved=0CB8Q6AEwAA
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
More Related Content
Similar to Extensible resource messaging between user applications and network elements in a communication network
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US20090279562?dq=20090279562&hl=en&sa=X&ei=FMtTVMy2M4PPmwXo3oCgDQ&ved=0CB8Q6AEwAA
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network. Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
https://www.google.com/patents/US20050076336?dq=20050076336&hl=en&sa=X&ei=e-JVVOb3J8G0uATNmILgAQ&ved=0CB8Q6AEwAA
Method and apparatus for automated negotiation for resources on a switched un...Tal Lavian Ph.D.
A resource negotiation service is provided to enable business logic decisions to be made when obtaining switched underlay network resources, to interface business logic with network conditions and schedules. The resource negotiation service may be implemented as a web service or other network service to enable business logic to be used in the selection of available network resources. This may allow policy to be used on both the subscriber side and the network provider side to optimize network resource allocations for a proposed transfer. The policy may include subscriber policy, network policy, and other factors such as current and expected network conditions. The resource negotiation service may include an interface to enable existing subscribers and new customers to obtain switched underlay resources.
https://www.google.com/patents/US20050076339?dq=20050076339&hl=en&sa=X&ei=8eFVVKDeHsOIuAT2soCAAg&ved=0CB8Q6AEwAA
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7944827?dq=US+7944827&hl=en&sa=X&ei=-XJSVPLjF8Kn8AXtz4G4Cw&ved=0CB8Q6AEwAA
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
We realize an open, programmable paradigm for application-driven network control by way of a novel network plane — the “service plane” — layered above legacy networks. The service plane bridges domains, establishes trust, and exposes control to credited users/applications while preventing unauthorized access and resource theft. The Authentication, Authorization, Accounting subsystem and the Dynamic Resource Allocation Controller are the two defining building blocks of our service plane. In concert, they act upon an interconnection request or a restoration request according to application requirements, security credentials, and domain-resident policy. We have experimented with such service
plane in an optical, large-scale testbed featuring two hubs (NetherLight in Amsterdam, StarLight in Chicago) and attached network clouds, each representing an independent domain. The dynamic interconnection of the heterogeneous domains occurred at Layer 1. The interconnections ultimately resulted in an optical end-to-end path (lightpath) for use by the
requesting Grid application.
Method and apparatus for live streaming media replication in a communication ...Tal Lavian Ph.D.
Replication of live streaming media services (SMS) in a communication network may be enabled by introducing the streaming media-savvy replication service on a network element, through a number of functions such as client/service registration and classification, packet interception and forwarding, media replication, status monitoring and configuration management. In an embodiment, client requests and server replies of an SMS are intercepted and evaluated by the network element. If the SMS is not streaming through the network element, the replication service registers the SMS and establishes a unique SMS session for the requesting clients. If the SMS is already streaming through the network element, the replication service replicates the streaming media and forwards it to the requesting clients. This reduces bandwidth usage on the links connecting the streaming media server with the network element and reduces the number of client connections to the streaming media provider's servers.
https://www.google.com/patents/US20050076099?dq=20050076099&hl=en&sa=X&ei=RONVVKPrLNefugSgnILwAQ&ved=0CB8Q6AEwAA
Embodiments of the invention provide methods and systems for optimizing network connections by a computing device. One or more network connections between a source and a destination may be monitored for one or more values of one or more connection parameters. Thereafter, one or more values of the connection parameters of the monitored network connections may be analyzed to select one or more combinations of the values. Further, the selected combinations of the values of the connection parameters may be stored. Subsequently, one or more monitored network connections may be established based on the stored values of the combinations.
https://www.google.com/patents/US20100220616?dq=20100220616&hl=en&sa=X&ei=68hTVNmbLYPAmwWb2oAg&ved=0CB8Q6AEwAA
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Network elements that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service, new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements so that malicious code may be filtered on the network before it reaches the end users. The filter rules may be derived by security software resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements that are to be implemented as detection points on the network.
https://www.google.com/patents/US20060123481?dq=20060123481&hl=en&sa=X&ei=AOFVVMCVB4i2uATUyoL4AQ&ved=0CB8Q6AEwAA
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Evaluation of load balancing algorithms on overlappiing wireless accesspointsnooriasukmaningtyas
Wireless networks came into the computing world replacing the costlier and
more complex wired method of connecting numerous equipment in the same
or different location via the use of cables. It provides the user devices a
connection to one another and the greater internet via connections to access
points. Generally, 802.11 access point products follow a default strongest
signal first approach in selecting user devices or nodes to connect to the
access point or overlapping access points. This standard does not make
provisions for even distribution of load and hence the quality of service and
the throughput in areas of congestion would be reduced. This article brings
forward two algorithms used in load balancing and they include round-robin
technique and the weighted round-robin technique to be used in the
simulation of the distribution of the load amongst the access points with the
results collated and compared to clearly show which algorithm is best suited
to be used as a standard for access point load distribution.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7580349?dq=US+7580349&hl=en&sa=X&ei=DXVSVID-EoTc8AW-_IDwBw&ved=0CB8Q6AEwAA
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Embodiments of the present invention present a method and apparatus for photonic line sharing for high-speed routers. Photonic switches receive high-speed optical data streams and produce the data streams to a router operating according to routing logic and produce optical data streams according to destination addresses stored in the data packets. Each photonic switch can be configured as one of a 1:N multiplexer or an M:N cross-connect switch. In one embodiment, optical data is converted to electrical data prior to routing, while an alternate embodiment routes only optical data. Another embodiment transfers large volumes of high-speed data through an optical bypass line in a circuit switched network to bypass the switch fabric thereby routing the data packets directly to the destination. An edge device selects one of the packet switched network or the circuit switched network. The bypass resources are released when the large volume of high-speed data is transferred.
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
Embodiments of the invention provide for providing support for sharing and exchanging in a network. The system includes a memory coupled to a processor. The memory includes a database comprising information corresponding to first users and the second users. Each of the first users and the second users are facilitated for sharing or exchanging activity, service or product, based on one or more conditions corresponding thereto. Further, the memory includes one or more instructions executable by the processor to match each of the first users to at least one of the second users. Furthermore, the instructions may inform each of the first users about the match with the at least one of the second users when all the conditions are met by the at least one second user based on the information corresponding to each of the second users.
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systems and methods for electronic communicationsTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things. The system includes a processor, and a memory coupled to the processor. The memory includes a database having one or more options corresponding to each of the Internet of Things. The memory further includes instructions executable by the processor to share at least one of the one or more options with one or more users of the things. Further, the instructions receive information corresponding to selection of the at least one option by the one or more users. Additionally, the instructions update the database based on the selection of the at least one option by the one or more users. Further, a device for enhancing interaction with the things is also disclosed.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
An object detection system for autonomous vehicle, comprising a radar unit and at least one ultra-low phase noise frequency synthesizer, is provided. The radar unit configured for detecting the presence and characteristics of one or more objects in various directions. The radar unit may include a transmitter for transmitting at least one radio signal; and a receiver for receiving the at least one radio signal returned from the one or more objects. The ultra-low phase noise frequency synthesizer may utilize Clocking device, Sampling Reference PLL, at least one fixed frequency divider, DDS and main PLL to reduce phase noise from the returned radio signal. This proposed system overcomes deficiencies of current generation state of the art Radar Systems by providing much lower level of phase noise which would result in improved performance of the radar system in terms of target detection, characterization etc. Further, a method for autonomous vehicle is also disclosed.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. A service engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The service engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device in accordance with a command design parameter. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Embodiments of the present invention provide a system for enhancing reliability in computation of ratings provided by a user over a social network. The system comprises of a processor and a memory coupled to the processor. The memory further comprises a rater score database, a satisfaction database, a social network registration database, a user profile database, and a plurality of instruction executable by the processor. Said instructions in the memory are enabled to accept a message from at least one user wherein said message comprises a satisfaction score associated with at least one service provider and to retrieve a rater score associated with said at least one user from said rater score database. Further, the memory includes instructions in order to compute a new satisfaction score based on said rater score and said satisfaction score and update said satisfaction database to include said new satisfaction score. In a similar manner, the new satisfaction score can be computed based upon the information stored in the social network registration database and user profile database.
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...PinkySharma900491
Class khatm kaam kaam karne kk kabhi uske kk innings evening karni nnod ennu Tak add djdhejs a Nissan s isme sniff kaam GCC bagg GB g ghan HD smart karmathtaa Niven ken many bhej kaam karne Nissan kaam kaam Karo kaam lal mam cell pal xoxo
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Peter Gallagher
In this session delivered at Leeds IoT, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...
Extensible resource messaging between user applications and network elements in a communication network
1. I IIIII 1111111111111111111111111111111111111111111111111111111111111111111111111111
US 20060075042Al
(19) United States
c12) Patent Application Publication
Wang et al.
(10) Pub. No.: US 2006/0075042 Al
(43) Pub. Date: Apr. 6, 2006
(54) EXTENSIBLE RESOURCE MESSAGING
BETWEEN USER APPLICATIONS AND
NETWORK ELEMENTS IN A
COMMUNICATION NETWORK
(75)
(73)
(21)
(22)
(51)
Inventors: Phil Yonghui Wang, Nepean (CA);
Franco Travostino, Arlington, MA
(US); Tal Lavian, Sunnyvale, CA (US)
Correspondence Address:
JOHN C. GORECKI, ESQ.
P.O BOX 553
CARLISLE, MA 01741 (US)
Assignee: Norte! Networks Limited, St. Laurent
(CA)
Appl. No.: 10/955,163
Filed: Sep. 30, 2004
Publication Classification
Int. Cl.
G06F 15116 (2006.01)
(52) U.S. Cl. .............................................................. 709/206
(57) ABSTRACT
Extensible resource messaging in a communication network
is provided through creation of a flexible, extensible, and
secure messaging environment. A client-server architecture
may be implemented in which user applications employ
messaging clients to send resource requests for network
information, allocation and other operations and receive
resource responses, and in which network elements, through
resource agents, may use messaging servers to accept
resource requests and return resource responses. Resource
agents in different network domains may interact through
the messaging environment and work together to fulfill
resource requests. An XML-based messaging mechanism
may be built with a defined message format that can provide
flexible message contexts. Network resource semantics may
be specified using XML schemas so that network resources
are expressed as resource-specific XML elements and network
updates can be implemented by updating the XML
resource schemas. Secure enhancements may be realized by
secure transport, message verification and other means.
Application Messaging Channel Resource Agent Networks
5. Patent Application Publication Apr. 6, 2006 Sheet 4 of 6 US 2006/0075042 Al
Figure 5
NS
Schemas
Request Serial No
Client
Key
[Extensions) ID
1---- All resources
1---Update all
Type
Title
Action
Status
Start Time
End Time
Bandwidth profile
Traffic Route profile
[Extensions]
L._ ___ ___J Specify~ ~~~~ ~[Extensions)
Figure 6
NS
Schemas
Response Serial No.
Agent
Request Serial No.
Key
[Extensions]
resources
ID
Type
Title
Action
Status
Start Time
End Time
Bandwidth profile
Traffic Route profile
[Extensions]
ID
Client
Type
[Extensions]
6. Patent Application Publication Apr. 6, 2006 Sheet 5 of 6
No
No
Application
over messaging
channel
138
message; extract
Yes
Figure 7
Messaging Channel Resource Agent
Extract resource
request from XML
No
US 2006/0075042 Al
Networks
Other resource agent
secures resources or
information
7. Patent Application Publication Apr. 6, 2006 Sheet 6 of 6 US 2006/0075042 Al
Figure 8
r 68
User Application
Processor Memory .M
70 Client
Process 10
I
Control I Messaging
Logic 72 Client 14
Resource XML
1/0 Schema 75
Ports 76
Figure 9 78 r
Resource Agent
Processor
Memory 84
80 I Messaging Stub 16 I
Resource Process .22.
Topology Discovery
Consolidation
Path Allocation
I
Control I Scheduling Software
Logic .62. Protocol Stack
l Resource XML
1/0 Schema 75
Ports §§.
8. US 2006/0075042 AI
EXTENSIBLE RESOURCE MESSAGING
BETWEEN USER APPLICATIONS AND NETWORK
ELEMENTS IN A COMMUNICATION NETWORK
BACKGROUND
[0001] 1. Field
[0002] This application relates to communication networks
and, more particularly, to extensible resource messaging
between user applications and network elements in a
communication network.
[0003] 2. Description of the Related Art
[0004] Data communication networks may include various
computers, servers, routers, switches, hubs, proxies, and
other devices coupled to and configured to pass data to one
another. These devices will be referred to herein as "network
elements," and may provide a variety of network resources
including physical resources such as communication links
and bandwidths, and logical resources such as VPN (Virtual
Private Network) and AAA (Authentication, Authorization
and Accounting) services. Conventionally, data has been
transported through the data communication networks by
passing protocol data units (such as cells, frames, packets, or
segments) between the network elements while utilizing one
or more type of network resources. A particular protocol data
unit may be handled by multiple network elements and cross
multiple communication links as it travels between its
source and its destination over the network.
[0005] Many user-end applications, such as grid computing,
streaming media, and storage on demand, require extensive
network capability to obtain access to data, computational
resources, storage resources, and other types of
resources that are connected in a communication network.
As communication networks have evolved, the type of
applications designed to run on the network have also
evolved and are expected to continue to evolve. To secure
access to the resources connected by the network, the
applications therefore communicate with network elements
to obtain network resources to meet their requirements.
[0006] Numerous protocols have been developed to allow
network elements to communicate with each other and to
allow applications to communicate with network elements,
several of which may be used by user applications to access
resources on the networks. For example, Reservation Protocol
(RSVP) may be used by Internet Protocol (IP) applications
in a communication network, such as a statistical
multiplexing packet based network, to reserve a portion of
the available bandwidth on the data transferring route
through the network. Similarly, User to Network Interface
(UNI) allows an application to set up a traffic path, such as
an ATM virtual circuit or an optical lightpath, over an ATM
or optical transport network. However, those protocols are
actual network signaling protocols, and thus are defined to
be used for pre-designated purposes such as to set up a
network route and/or to perform link setup and teardown.
Additionally, these protocols are generally defined by one or
more standard bodies to enable interaction between the
network elements, and are not specifically designed to
handle interactions between networks and applications. As
new types of network resources continue to emerge on
communication networks, the manner in which resource
information is obtained and the manner in which resource
utilization is obtained are important aspects to fulfilling
application requests.
1
Apr. 6, 2006
SUMMARY OF THE DISCLOSURE
[0007] According to an embodiment of the invention,
extensible resource messaging in a communication network
is provided through the creation of a flexible, extensible and
secure messaging environment between user applications
and network elements. User applications are represented by
resource clients that request information and/or the utilization
of network resources. Network elements are represented
by resource agents that manage and control access to and
utilization of network resources. The messaging environment
is flexible, according to one embodiment of the invention,
because it may be implemented as an XML-based
messaging mechanism. This mechanism contains a defined
XML format that can provide flexible message contexts for
resource requests and responses. Thus, applications can send
XML messages to request network resource reservations and
network discovery queries, and networks can send XML
messages to respond to the application requests.
[0008] The messaging environment is extensible, according
to one embodiment of the invention, because it can
introduce network resource semantics in terms of XML
schemas. With the semantics, network resources can be
added or removed through updating XML schemas. Thus,
applications can easily use new network resources or avoid
outdated network resources.
[0009] The messaging environment is secure, according to
one embodiment of the invention, because it may be built
using secure transport technologies, including for example,
the exchange of digital signatures and certificates to authenticate
the participating applications and networks or network
agents. Through secure transport, messages from applications
and networks may be encrypted and decrypted.
Through digital identifications and certificates, applications
can verify whether the networks have provided trustable
information, while networks can authorize and even account
resource utilization according to applications' authentication.
[0010] The messaging environment may be implemented
using a client-server computer architecture in which one or
more messaging servers are implemented on the network to
accept requests from applications and one or more messaging
clients are created for resource applications requiring
access to network resources. One or more resource agents
may be associated with the messaging servers to realize
network resource allocations on underlying networks or
network domains. Optionally, one or more of the resource
agents may also work with another resource agents to allow
resource allocations and information to be. obtained from
other networks, with resource optimization when possible.
BRIEF DESCRIPTION OF THE DRAWINGS
[0011] Aspects of the present invention are pointed out
with particularity in the claims. The following drawings
disclose one or more embodiments for purposes of illustration
only and are not intended to limit the scope of the
invention. In the following drawings, like references indicate
similar elements. For purposes of clarity, not every
element may be labeled in every figure. In the figures:
[0012] FIG. 1 is a functional block diagram of an example
of a communication network including an extensible messaging
environment according to an embodiment of the
invention;
9. US 2006/0075042 AI
[0013] FIG. 2 is a functional block diagram of the messaging
enviromnent of FIG. 1, according to an embodiment
of the invention;
[0014] FIGS. 3A and 3B are functional block diagrams of
XML processes for exchanging a resource request message
and a resource response message between an application and
a resource agent according to an embodiment of the invention;
[0015] FIG. 4 is a message format for use in the messaging
enviromnent ofFIGS.1-2 and in the processes of FIGS.
3A and 3B according to an embodiment of the invention;
[0016] FIGS. 5 and 6 are example XML schemas for use
with embodiments of the invention, in which FIG. 5 is an
example of a resource request schema and FIG. 6 is an
example of a resource response schema;
[0017] FIG. 7 is a flow diagram illustrating a process of
using the messaging enviromnent to obtain access to network
resource information and resource allocations according
to an embodiment of the invention;
[0018] FIG. 8 is a functional block diagram of a user
application including a messaging client according to an
embodiment of the invention; and
[0019] FIG. 9 is a functional block diagram of a resource
agent including a messaging stub according to an embodiment
of the invention.
DETAILED DESCRIPTION
[0020] The following detailed description sets forth
numerous specific details to provide a thorough understanding
of the invention. However, those skilled in the art will
appreciate that the invention may be practiced without these
specific details. In other instances, well-known methods,
procedures, components, protocols, algorithms, and circuits
have not been described in detail so as not to obscure the
invention.
[0021] FIG. 1 illustrates an example of a communication
network according to an embodiment of the invention in
which a messaging enviromnent is established to enable a
client application 10 (also referred to herein as a user
application or a resource application) to obtain network
resource information and request resource allocations on a
communication network 12. According to an embodiment of
the invention, the messaging enviromnent includes a messaging
client 14, a messaging stub (also referred to herein as
a messaging server) 16 and a messaging channel18 extending
between the messaging client and messaging stub to
allow communications to take place between the peers of the
messaging enviromnent.
[0022] The messaging client and the messaging stub use
the same message format for communications. The message
format will be discussed in greater detail below, but according
to one embodiment of the invention, the message format
is configured to implement an extensible language such as
eXtensible Markup Language (XML), to enable communications
between the applications and communication network
to be able to adapt with changes to the applications and
changes to the network, without the creation of interdependence
between these participants.
[0023] The messaging enviromnent may include multiple
messaging clients and multiple messaging stubs and the
2
Apr. 6, 2006
invention is not limited to an implementation of the messaging
enviromnent having any set number of clients and
stubs. For example, multiple messaging stubs may be associated
with a given network or network domain, or a given
messaging stub may serve multiple network domains.
Optionally, inter-domain exchanges may implement additional
messaging enviromnents 18' such that the messaging
stub of one messaging enviromnent is able to participate
through an associated messaging client 14' to interface other
messaging stubs 16'.
[0024] The communication network may include multiple
network elements 20 connected together in a predefined or
ad-hoc manner and configured to provide network services
such as bandwidths over communication links to applications
and network users. The invention is not limited to the
particular manner in which the network elements are interconnected,
the type of protocols they use to implement
exchanges, route data through the network, or otherwise
enable communications to take place. The invention is also
not limited to the particular types of services the network
elements are configured to provide on the network. For
example, the communication links may be optical links,
copper links, wireless links, or formed in other manners. The
network elements may likewise be configured to provide
optical transport services, wired data services, or wireless
data services. The invention is thus not limited to use with
a particular type of network element or to a particular
network architecture.
[0025] One or more resource agents 22 on the network are
configured to receive requests for network resources and
fulfill the requests. One such resource agent is described in
greater detail in a related U.S. patent application Ser. No.
10/719,225, filed Nov. 21, 2003, and entitled Method and
Apparatus for Scheduling Resources on a Switched Underlay
Network, the content of which is hereby incorporated by
reference. As described in greater detail in that patent
application, the resource agent is able to receive requests for
resource allocations, interface with the network elements
using native protocols in use on the network(s), and schedule
resource allocations to fulfill the requests. Since the details
of how resources may be obtained from a resource agent
system are disclosed in greater detail in this related application,
those details will not be described in greater detail
herein. The messaging enviromnent discussed in connection
with embodiments of the invention herein may work with
the referenced resource agent or other resource agents and
the invention is not limited to an embodiment that 1s
configured to work with the referenced resource agent.
[0026] The resource agent may be associated with a single
network domain or may be associated with multiple network
domains. Optionally, a messaging enviromnent according to
an embodiment of the invention may be established between
resource agents of multiple domains to secure cross-domain
(referred to herein as inter-domain) resource allocations.
Similarly, multiple resource agents may be instantiated for
the same domain to provide redundancy and to enable load
sharing to take place across the several resource agents on
the domain. Optionally, messaging enviromnents may be
established between these resource agents to enable allocations
to be communicated between the several resource
agents to maintain synchronization between the resource
agents and to allow the resource agents to delegate resource
requests to other resource agents with greater availability or
10. US 2006/0075042 AI
capacity. To prevent the drawings from becoming too complicated,
only one resource agent has been shown in each
domain 12, 12'. The invention is not limited in this manner,
however, as additional resource agents may be provided as
well. Each resource agent may be associated with all network
elements in the domain, with a subset of network
elements in the domain, with particular types of network
elements in the domain, or may be allocated network elements
on another basis, depending on the desired topography
of the network.
[0027] FIG. 2 illustrates a messaging environment 24
created between a resource application 10 and resource
agent 22 to enable network resources provided by network
elements 20 to be discovered by and obtained for the
resource application. As shown in FIG. 2, when a resource
application, optionally interfacing a network user 26,
requires access to network resources, the resource application
will establish a messaging session over the messaging
environment 24 by instantiating an instance of a messaging
client 14. The messaging client establishes a messaging
channel 18 to a messaging server, referred to herein as a
messaging stub 16, associated with a resource agent 22. As
discussed above, where the resource agent 22 requires
access to network resources not under it's control, it may
establish one or more additional messaging environments
24' with other resource agents 22' by instantiating one or
more messaging clients 14' configured to interface with
messaging stubs 16' associated with the other resource
agents 22'. The invention is not limited in this manner,
however.
[0028] The messaging channel may be implemented using
a Transport Control Protocol (TCP) stream socket, an Hyper
Text Transfer Protocol (HTTP) session, or an enhanced
XML communication such as Simple Object Access Protocol
(SOAP), Data Web Transfer Protocol (DWTP) or
another conventional protocol. Communications on themessaging
channel may be secured using a secure communication
protocol such as Transport Layer Security (TLS) or
Secure Socket Layer (SSL), or a secure XML messaging
protocol such as SOAP with XML signatures and encryption.
Additionally, the messages may be configured to contain
the identities of the applications and network agents,
optionally digitally signed by the applications and agents or
containing a certificate provided by the agents or applications,
to ensure that the communications have not be altered
during transmission. Other forms of security may be implemented
as well and the invention is not limited to an
embodiment that implements this particular security
scheme. For example, the messaging channel between the
messaging client and messaging stub may be established
using a public key exchange protocol such as Internet Key
Exchange version two (IKEv2) or an equivalent, although
the invention is not limited in this manner as numerous.
procedures may be used to exchange keys or otherwise
allow the participants to authenticate the communication
channel.
[0029] The resource agent, as discussed in greater detail in
U.S. patent application Ser. No. 10/719,225, is configured to
perform network topology discovery, consolidation, route
creation, path allocation, and scheduling, as well as other
functions, and to ascertain availability of network resources
and effect reservation of those network resources. The
resource agent may be extended with the messaging stub,
3
Apr. 6, 2006
according to one embodiment of this invention. The resource
agent has access to network protocol interfaces 30 to allow
it to communicate with network elements 20 using one or
more network communications protocols when applicable.
Examples of protocols that may be used with conventional
networks include:
[0030] User to Network Interface (UNI), a protocol
developed to interface Customer Premises Equipment
(CPE) such as ATM switches and optical cross connects
with public network equipment;
[0031] General Switch Management Protocol (GSMP),
a general Internet Engineering Task Force (IETF) protocol
configured to control network switches;
[0032] Transaction Language 1 (TLl), a telecommunications
management protocol used extensively to manage
SONET and optical network devices;
[0033] Simple Network Management Protocol
(SNMP), an IETF network monitoring and control
protocol used extensively to monitor and adjust Management
Information Base (MIB) values on network
devices such as routers and switches;
[0034] Resource Reservation Protocol-Traffic Engineering
(RSVP-TE), a signaling protocol used in MultiProtocol
Label Switching (MPLS) networks, that
allows routers on the MPLS network to request specific
quality of service from the network for particular flows,
as provisioned by a network operator; and
[0035] Bandwidth Broker, an Internet2 bandwidth signaling
protocol.
Other conventional, proprietary protocols, or to be developed
protocols may be used as well, and the invention
is not limited to these particular identified protocols.
The resource agent 22 may effect reservations of
resources on a switched underlay network, packetbased
statistically multiplexed network, or other type of
network. The resource agent 22 may also provide
information about the networks in addition to or instead
of performing resource allocations. The invention is not
limited to particular actions that may be taken on the
underlying network.
[0036] The resource agent can serve multiple resource
requests from multiple resource applications at the same
time. The resource agent returns inquiry results and reservation
information as a resource response for each resource
request. A resource agent can be implemented at a network
management station, as a network service, or as a network
process in the network control plane. The resource application
can be an user end application, a middleware agent, a
resource broker, or another resource agent. The invention is
not limited to the type of resource agent or resource application
chosen to exploit the messaging environment
described herein.
[0037] The messaging stub 16 and resource agent 22 can
be instantiated in many forms on the network. Optionally,
the messaging stub and resource agent may be implemented
as a stand-alone Web Service, or as a Web Services configured
to interact with other Web Services, although the
invention is not limited to this environment. For example,
the messaging stub 16 may be a web service configured as
a server to host sessions with messaging clients, and con-
11. US 2006/0075042 AI
figured as a web service to interact with resource agents. In
one embodiment, the messaging stub and resource agents
are instantiated using the Globus Toolkit, such that components
are configured with Open Grid Services Interface
(OGSI) compliant application interfaces within the Open
Grid Services Architecture (OGSA). The invention is not
limited to this embodiment, however, as the messaging stub
and resource agents may be instantiated in other ways on the
network. The messaging stub 16 and resource agent 22 may
be collocated on a network element on the communication
network or may be instantiated on separate network elements
and communicate using a proprietary or open forum
protocol. The invention is not limited to the manner in which
the messaging stub is instantiated on the network relative to
the resource agent, although in a preferred embodiment the
two components are tightly integrated to avoid security or
other communication lapses between the two components. A
given messaging stub 16 may thus serve one or more
resource agents 22.
[0038] According to an embodiment of the invention, the
messaging environment is configured to implement a flexible
and secure messaging mechanism between user applications
and network elements. The messaging environment,
according to one embodiment of the invention, may be
implemented as an XML-based messaging mechanism with
XML-based resource semantics through which applications
can send request messages for network resource reservations
and network discovery queries, and through which networks
send response messages back to the applications. By causing
the message context to be defined by XML, a network
resource can be represented by an XML element in the
resource schema. As a result, adding new XML elements to
the resource schema can easily allow new network resources
and services to be made available to applications without
requiring the applications to be modified to take advantage
of the new resources or services. Similarly, removing old
XML elements from the resource XML schemas can delete
outdated network resources and services as the networks
evolve and as services and resources are phased out.
[0039] The actual communication between user applications
and network elements may include resource requests
and responses. User applications send their resource
requests in terms of resource request messages while network
elements (through resource agents) send their resource
feedback in terms of resource response messages. These
messages are formatted and must be consistent with the
resource XML schemas so that they can be understood by
the two resource peers.
[0040] FIGS. 3A and 3B illustrate an XML process for
exchanging a resource request message between a resource
application and a resource agent, and an XML process for
exchanging a resource response between a resource agent
and a resource application. Similar processes could be used
to exchange other XML messages and the invention is not
limited to the use of these two particular messages or
processes. As shown in FIG. 3, when an application (optionally
interfaced by a user) submits a resource request 32, the
message is formatted 34 using an XML schema 36 which
outlines the message context of resources. The XML schema
36 defines available fields in an XML document that may be
made available to the resource application, and also is used
to format the message for transmission over the messaging
environment 18. One XML schema that may be used is
4
Apr. 6, 2006
discussed in greater detail below in connection with FIG. 5.
The formatted message is an XML message 38 which may
be transmitted to the resource agent.
[0041] The resource agent, upon receipt of the XML
message 38, parses the XML message 40 using the XML
schema 36 to verify the definition of fields in the XML
message to extract operable information from the resource
request 42. The same procedure is followed to generate a
resource response, as shown in FIG. 3B, except that the
resource agent generates the resource response 44, which is
formatted 46 using a schema 48. One XML schema that may
be used is discussed in greater detail below in connection
with FIG. 6. The formatted XML message 50 is transmitted
over the messaging environment, parsed 52 using the XML
schema 48 to verifY the definitions of the fields in the
document, and to extract the resource response 54. The
manner in which an XML document may be created, formatted,
and parsed is well known and thus will not be
explained in greater detail herein.
[0042] As discussed above, messages carried on themessaging
channel 18 are defined by the resource XML schemas.
Thus, adding or deleting XML elements in the XML
schemas can add or delete network resources and services to
affect the availability of those services on the network. This
enables the messaging environment to be extensible to
accommodate new resources and services without requiring
applications to be modified to take advantage of the new
services. Additionally, new types of resource messaging
operations can also be added or deleted by XML schema
updates. Thus, not only can the messaging change with time,
but new types of messaging can be added simply by adding
new schemas that may then be used by the applications to
take advantage of the new messaging abilities. XML schema
updates may be provided by the resource agent or a third
party, and the invention is not limited to the particular
manner in which the XML schema is updated.
[0043] FIG. 4 illustrates a message format according to an
embodiment of the invention. As shown in FIG. 4, the
message format outlines the context of each message in
terms of XML elements, and generally includes a generic
header 60, a messaging header 62, and resource data 64. The
generic header provides XML-related information such as
version and coding information, similar to the header in any
XML document. The messaging header provides messaging
channel specific information such as message type,
namespaces, Uniform Resource Identifier (URI) definitions,
and schema locations. The messaging header may include
additional security information such as message serial numbers,
source and destination, personal identification and
public key information. The resource data contains detailed
parameters about the resource request or resource feedback.
From the perspective ofXML docnmentation, the messaging
header is the top XML element while the resource data
provides concrete XML elements. Several examples of
particular schemas that may be used to create requests and
responses are discussed in greater detail below in connection
with FIGS. 5 and 6.
[0044] A resource request may be used to obtain a network
resource allocation, to obtain information about the network,
and for other operations. A resource application may use a
network resource allocation request to reserve a particular
allocation of network resources and/or services, to modify or
12. US 2006/0075042 AI
release a previous reservation, or for many other purposes.
The resource application may use a network information
query request to obtain general information about the network,
to find out what resources and services are available
to it, and to query a particular network resource or service
that it wants to use. Correspondingly, a resource agent may
return a resource response with a network resource allocation,
information, query results, and other results.
[0045] FIGS. 5 and 6 illustrate several XML schemas of
network resources that may be used to define XML messages
in the messaging environment discussed above. A
major element in the schema is "Resource", which represents
a network resource. In the schemas, the resource
element is outlined with some generic fields and can be
extended for particular resources such as bandwidth, traffic
route, VPN and so on. Each resource may have its own
schema, which is therefore referenced as a resource element
in the fundamental resource XML schemas The invention is
not limited to these particular schemas, however, since the
schemas may change depending on the type of resources to
be provided, the particular requirements of the implementation,
and numerous other factors. Thus, the embodiments
illustrated in FIGS. 5 and 6 are to be understood to be
examples only, and not limiting of the invention.
[0046] As shown in FIG. 5, a resource request XML
schema 36 may include a header field, an allocation field, an
information field, and optionally other additional fields to
enable resource requests to be created for transmission over
the messaging environment 24. The header field may include
an XML tag specifYing the schema version number and a
request ID tag enabling the inclusion of information specific
to the request that may be used to distinguish the request
from other requests. Examples of such information may
include the request serial number, client identification and/or
client certificates or signatures, and other information that
may be used to differentiate the request from other requests.
[0047] The request schema includes an allocation field
which indicates the type of action to be performed, and may
be used by a request if the request is intended to affect the
allocation of network resources. For example, the allocation
field may contain an allocate tag indicating that resources
should be allocated to the client, a re-allocate tag indicating
that resources should be allocated in a different manner, or
a release tag indicating that allocated resources are not
required and should be released. Other tags may be used as
well and the invention is not limited to these particular tags.
[0048] In addition to the allocation tags, the allocation
field may include resource specific allocation information
indicative of the types of resources to be allocated/affected
by the request. For example, the allocation information may
include an identification of particular resources, the resource
type, resource name or title, the action to be performed, the
status of the application or resource to be affected, the start
time of the requested allocation, the end time of the allocation,
the bandwidth profile desired for the intended allocation,
the type of traff1c route desired for the allocation, and
many other types of allocation specific information. The
invention is not limited to the particular types of allocation
information that may be provided using the allocation field.
[0049] The request schema also includes an information
field that may be used to obtain information about the
network resources from the resource agent. For example, the
5
Apr. 6, 2006
information field may include a discovery tag to enable the
resource request to be used to discover available network
resources, a refresh tag to enable the resource request to be
used to update its list of available resources, and a query tag
to enable the resource request to be used to query the
availability or status of specific identified network resources.
Since the query tag is directed to specific resources, the
schema enables additional information to be included to
allow specific resources to be identified. For example, the
query information may include resource identification information,
client information, or resource type information,
although the invention is not limited to these particular types
of query information.
[0050] FIG. 6 illustrates a resource response XML schema
48 that may be used to create responses to requests from
messaging clients, or may otherwise be used to distribute
information over the messaging channel 18. For example,
the response messages may be used for the periodic transmission
of information and are not limited to only be used
to respond to request messages. In the embodiment illustrated
in FIG. 6, the resource response schema includes a
header field, an allocation field, and an information field,
which may be selectively used in operation depending on the
type of response to be created. Specifically, the response
may be an allocation response including allocation information
or an information response containing information
about the network. Optionally, both types of information
may be contained in the same response; for example a
response may contain information about all routers available
on the network and an allocation of bandwidth through a
particular subset of the routers. Alternatively, two responses
may be provided where more than one type of response is
appropriate.
[0051] The header field may enable information to be
included to enable the XML message to be parsed, and may
include items such as the schema version that was used to
generate the response and the location of the schema, to
enable the XML parser to correctly parse the XML response.
The header field may also enable a response ID tag to be
included to enable the response to be identifiable to the
messaging client. For example, the response ID tag may
allow response identification information to be included,
such as the response serial number, the request serial number
to which the response pertains, the agent identification
information, and any required agent key information such as
certificates or signatures to enable the response to be verified
to the messaging client and/or application. Fields for other
types of information may be included as well as desired.
[0052] The response schema includes an allocation field
configured to contain allocation tags such as an allocate tag,
a reallocate tag, and a release tag indicative of the particular
resources to be allocated, reallocated, or released on the
network. In addition, the schema may enable the allocation
tags to specify additional information about the resources,
such as the resource identification, the type of resource, the
title of the resource if it has a common name, the action to
be performed on the resource, the current status of the
resource, the start and end times associated with the resource
allocation, the bandwidth profile associated with the
resources, and the traffic route profile. Tags for other information
may be provided as well, and the invention is not
limited to a schema including tags for these particular types
of resource allocation information. For example, the schema
13. US 2006/0075042 AI
may be developed to enable the allocation of particular VPN
resources or to enable usage information, such as label
information or required header information, to be passed
using resource response messages in connection with the
allocation information.
[0053] The response schema also includes an information
field containing one or more tags which may be used to
transmit network resource information to the resource client.
For example, the information field may include a discover
tag enabling a list of all resources to be provided, a refresh
tag enabling a list of updated resources to be provided, and
a query response enabling a list of resources to be provided
in response to a particular resource query. The resources
may be identified by resource ID, client ID, type, or in
another manner, and the invention is not limited to the
manner in which the schema is configured to identifY the
resources.
[0054] FIG. 7 illustrates a method of using the extensible
messaging environment described above in connection with
FIGS. 1-6. As shown in FIG. 7, initially, a resource agent
will be started on the network (100) and perform whatever
resource discovery, setup, aggregation, and other operations
are required or desirable (102) to enable the resource agent
to interface with the network 12 and secure desired
resources or information from the network 12. Once the
resource agent has completed its initialization process, it
will invoke a messaging stub (1 04) which will begin to listen
over the messaging channel (106) for resource requests from
messaging clients. Although the process so far has assumed
the resource agent will be started before the messaging stub
is started, the invention is not limited in this manner as the
messaging stub may be started initially, and may then
interface with instantiated resource agents or cause necessary
resource agents to be started. The invention is thus not
limited to the particular manner in which the messaging stub
and resource agent are initialized or the manner in which
they are associated.
[0055] Once the messaging channel is established, such
that the messaging stub is listening on the messaging channel,
resource applications may make requests over the
messaging channel for access to network resources or for
information about the underlying networks (108). To do so,
the application will generate a resource request (110) and
invoke a messaging client (112). The resource request will
be formatted into an XML message using the messaging
client in a manner as discussed above in connection with
FIG. 3A (114) and the formatted XML message will be sent
over the messaging channel to the messaging stub (116).
[0056] When the messaging stub receives the XML message
(118) it will extract the resource request from the XML
message using the procedure discussed above in connection
with FIG. 3A (120) and pass the resource request to the
resource agent to be processed and fulfilled (122). In connection
with this, either the resource agent or the resource
stub will make a determination whether the resources are on
a local domain under the control of the resource agent or
whether the resource request requires access to other
resources (124). If all the resources are available on the local
domain, the resource agent will secure the resources or
information (126). If not, one or more resource agents for
other domains will be accessed (128) to enable the other
resource agent( s) to secure the resources or information
6
Apr. 6, 2006
(130). A subservient messaging environment may be
spawned to interface with the other resource agents as
discussed in greater detail above.
[0057] Interfacing between domains may occur in many
different ways. In one embodiment, the messaging stub is
configured to interface with a particular resource agent, and
may cause that resource agent to interface other resource
agents as necessary. In another embodiment, the messaging
stub is provided with direct access to multiple resource
agents and may interface with these resource agents directly.
The invention is not limited to the manner in which interdomain
resources are obtained.
[0058] Once the resources have been obtained, the
resource responses from the resource agent(s) are processed
to generate one or more resource responses, as discussed in
greater detail above in connection with FIG. 3B (132). The
XML response is then sent over the messaging channel (134)
and, if resources have been allocated during this process,
any necessary tables associated with the resource agent may
be updated to reflect the allocation (136).
[0059] The resource application, upon sending a resource
request over the messaging channel, will listen on the
messaging channel for a resource response message. Upon
receipt of a resource response message, the resource application
will extract the resource response using the process
described above in connection with FIG. 3B (138) and
determine if the requested resources have been allocated or
if the requested information has been provided (139). If the
resource response did not provide the requested resources or
if additional resources are otherwise required, the resource
application may optionally generate a second request and the
process may iterate until sufficient resources are obtained.
Alternatively, the process may end at this point. If the
resources have been allocated, or resource information provided
(140), the resource application uses the resources 142
in a conventional manner and the process ends until additiona!
resources are required.
[0060] FIGS. 8 and 9 illustrate embodiments of network
elements configured to respectively implement a user application,
including a messaging client, and a resource agent,
including a messaging stub, according to embodiments of
the invention. Each of these embodiments will be discussed
in greater detail below.
[0061] As shown in FIG. 8, a user application may be
instantiated on a network element 68 including a processor
70 having control logic 72 configured to implement the
functions ascribed to the client process 10 and messaging
client 14 discussedhereininconnection withFIGS.1-7. The
network element implementing the user application has a
native or interfaced memory 74 containing data and instructions
to enable the processor to implement the functions
ascribed to it herein. For example, the memory may contain
software modules configured to perform functions associated
with the resource application 10 and the messaging
client 14, as well as optionally other modules to enable the
network element to participate in transactions over the
messaging channel 18. For example, the messaging client
may have access to one or more XML schemas of network
resources 75 to allow it to generate resource requests and
parse resource responses. The invention is not limited to the
embodiment illustrated herein as the resource application
and messaging client may be instantiated on separate net-
14. US 2006/0075042 AI
work elements, if desired. One or more I/0 ports 76 may be
provided to enable the network elements to communicate on
the network, and optionally additional functional modules
may be provided to enable the network element to perform
additional services on the network.
[0062] FIG. 9 illustrates a resource agent according to an
embodiment of the invention. As shown in FIG. 9, a
resource agent may be instantiated on a network element 78
including a processor 80 having control logic 82 configured
to implement the functions ascribed to the messaging stub
16 and processes associated with the resource agent 22
discussed herein in connection with FIGS. 1-7. The network
element has a native or interfaced memory 84 containing
data and instructions to enable the processor to implement
the functions ascribed to it herein. For example, the memory
may contain software modules configured to perform functions
associated with the messaging stub 16 and resource
agent 22, as well as optionally other modules to enable the
network element to participate in transactions over the
messaging channel 18. For example, the messaging stub
may have access to one or more XML schemas 75 of
network resources to allow it to interpret resource requests
and to generate resource responses. The invention is not
limited to the embodiment illustrated herein as the resource
application and messaging client may be instantiated on
separate network elements, if desired. One or more I/0 ports
86 may be provided to enable the network elements to
communicate on the network, and optionally additional
functional modules may be provided to enable the network
element to perform additional services on the network.
[0063] It should be understood that all functional statements
made herein describing the functions to be performed
by the methods of the invention may be performed by
software programs implemented utilizing subroutines and
other programming techniques known to those of ordinary
skill in the art. Alternatively, the functions may be implemented
in hardware, firmware, or a combination of hardware,
software, and firmware. The invention is thus not
limited to a particular implementation.
[0064] The control logic 72, 82, may be implemented as a
set of program instructions that are stored in a computer
readable memory within the network element and executed
on a microprocessor, such as processor 70, 80. However, in
this embodiment as with the previous embodiments, it will
be apparent to a skilled artisan that all logic described herein
can be embodied using discrete components, integrated
circuitry, programmable logic used in conjunction with a
programmable logic device such as a Field Programmable
Gate Array (FPGA) or microprocessor, or any other device
including any combination thereof. Programmable logic can
be fixed temporarily or permanently in a tangible medium
such as a read-only memory chip, a computer memory, a
disk, or other storage medium. Programmable logic can also
be fixed in a computer data signal embodied in a carrier
wave, allowing the programmable logic to be transmitted
over an interface such as a computer bus or communication
network. All such embodiments are intended to fall within
the scope of the present invention.
[0065] It should be understood that various changes and
modifications of the embodiments shown in the drawings
and described herein may be made within the spirit and
scope of the present invention. Accordingly, it is intended
7
Apr. 6, 2006
that all matter contained in the above description and shown
in the accompanying drawings be interpreted in an illustrative
and not in a limiting sense. The invention is limited only
as defined in the following claims and the equivalents
thereto.
[0066] What is claimed is:
1. A method of messaging between an application and
network elements in a communication network, the method
comprising the steps of:
instantiating a messaging client associated with the application;
generating by the messaging client an XML document
using an XML schema containing tags indicative of
resources required by the application; and
transmitting the XML document over a messaging channel
to a messaging stub associated with the communication
network.
2. The method of claim 1, wherein the messaging stub is
associated with a resource agent configured to interface
network elements on the communication network.
3. The method of claim 1, wherein the resources required
by the application comprise bandwidth on the communication
network.
4. The method of claim 1, wherein the resources required
by the application comprise VPN resources on the communication
network.
5. The method of claim 1, wherein. the resources required
by the application comprise information relating to the
available network resources on the communication network.
6. The method of claim 1, wherein the messaging channel
is a secure messaging channel.
7. The method of claim 6, wherein the secure messaging
channel is provided using at least one of authentication and
digital signatures.
8. The method of claim 1, wherein the XML document
defies network operations.
9. The method of claim 8, wherein the operations comprise
at least one of discovery, status updates, information,
and allocations.
10. The method of claim 1, wherein the XML schema
allows network resources to be expressed as resource specific
XML elements.
11. The method of claim 1, wherein the transmitted XML
document is a request message, the method further comprising
the step of receiving a response message related to
the request message.
12. The method of claim 11, wherein the response message
and the request message share a common format.
13. The method of claim 1, further comprising the step of
instantiating a second messaging client associated with the
messaging stub to enable the messaging stub to establish a
second messaging channel to obtain at least a portion of the
resources required by the application.
14. The method of claim 13, wherein the messaging stub
is associated with a first network domain, and wherein tile
portion of the resources are associated with a second network
domain.
15. An XML schema configured to enable network
resources to be requested on a communications network, the
XML schema comprising:
15. US 2006/0075042 AI
a header field configured to enable a request created using
the schema to include identifying information; and
an allocation field configured to enable the request created
using the schema to include a request for allocation of
network resources.
16. The XML schema of claim 15, wherein the allocation
field allows network resources to be expressed as resource
specific XML elements.
17. The XML schema of claim 15, wherein the resources
are virtual private network (VPN) resources.
18. The XML schema of claim 15, wherein the header
field includes an XML tag configured to enable identification
of the XML schema used to create the request, and a request
ID tag configured to enable identifYing information to be
input into the request.
19. The XML schema of claim 15, wherein the allocation
field contains tags configured to enable the request to specify
resources to be allocated, reallocated, and released.
20. The XML schema of claim 19, wherein the resources
may be specified using at least one of resource ID, resource
type, resource name, and wherein the request may include
resource parameters comprising at least one of a bandwidth
profile, a traffic route profile, a start time and an end time.
21. The XML schema of claim 15, wherein the XLM
schema further comprises an information field configured to
enable the request created using the schema to include a
request for information about network resources.
22. The XML schema of claim 21, wherein the information
field includes at least one of a discovery tag that may be
used to discover network resources, a refresh tag that may be
used to update a list of network resources, and a query tag
that may be used to inquire as to particular identified
network resources.
8
Apr. 6, 2006
23. One or more processor readable storage devices
having processor readable code embodied thereon, said
processor readable code being configured to program one or
more processors to create a response message using an XML
schema configured to enable network resource semantics to
be expressed as resource specific XML elements,
24. The one or more processor readable storage devices of
claim 23, wherein the XML schema includes a header field
configured to enable the response message created using the
schema to include identifying information, and an allocation
field configured to enable the response message created
using the schema to include information associated with an
allocation of network resources.
25. The one or more processor readable storage devices of
claim 24, wherein the header field includes an XML tag
configured to enable identification of the XML schema used
to create the response, and an ID tag configured to enable the
request to include identifying information about an associated
request
26. The one or more processor readable storage devices of
claim 24, wherein the information associated with the allocation
of network resources comprises at least one of
resource ID, resource type, and resource name, and wherein
the response may further include resource parameters comprising
at least one of a bandwidth profile, a traffic route
profile, a start time and an end time,
27. The one or more processor readable storage devices of
claim 24, wherein the XLM schema includes an information
field configured to enable the response to include information
about network resources.
* * * * *