A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8341257?dq=US+8341257&hl=en&sa=X&ei=Zm1SVMvBD6OimQXAsYKQDw&ved=0CB0Q6AEwAA
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8078708?dq=US+8078708&hl=en&sa=X&ei=mnFSVOLRNI2A8QXyt4GgBA&ved=0CB8Q6AEwAA
Method and apparatus for preconditioning data to be transferred on a switched...Tal Lavian Ph.D.
Data may be preconditioned to be transferred on a switched underlay network to alleviate the data access and transfer rate mismatch, so that large files may be effectively transferred on the network at optical networking speeds. A data meta-manager service may be provided on the network to interface a data source and/or data target to prepare a data file for transmission, such as by dividing a large file into multiple pieces and causing those pieces to be stored on multiple storage subsystems. The file may then be read from the multiple storage subsystems simultaneously and multiplexed onto scheduled resources on the network. This enables the high bandwidth transfer resource to be filled by a data transfer without requiring the storage subsystem to be augmented to output the data at the network transfer rate. The file may be de-multiplexed at the data target to one or more storage subsystems.
https://www.google.com/patents/US20050076173?dq=20050076173&hl=en&sa=X&ei=2eJVVJShKdPbuQSjsIDoAQ&ved=0CB8Q6AEwAA
Distributed Framework for Data Mining As a Service on Private CloudIJERA Editor
Data mining research faces two great challenges: i. Automated mining ii. Mining of distributed data.
Conventional mining techniques are centralized and the data needs to be accumulated at central location. Mining
tool needs to be installed on the computer before performing data mining. Thus, extra time is incurred in
collecting the data. Mining is 4 done by specialized analysts who have access to mining tools. This technique is
not optimal when the data is distributed over the network. To perform data mining in distributed scenario, we
need to design a different framework to improve efficiency. Also, the size of accumulated data grows
exponentially with time and is difficult to mine using a single computer. Personal computers have limitations in
terms of computation capability and storage capacity.
Cloud computing can be exploited for compute-intensive and data intensive applications. Data mining
algorithms are both compute and data intensive, therefore cloud based tools can provide an infrastructure for
distributed data mining. This paper is intended to use cloud computing to support distributed data mining. We
propose a cloud based data mining model which provides the facility of mass data storage along with distributed
data mining facility. This paper provide a solution for distributed data mining on Hadoop framework using an
interface to run the algorithm on specified number of nodes without any user level configuration. Hadoop is
configured over private servers and clients can process their data through common framework from anywhere in
private network. Data to be mined can either be chosen from cloud data server or can be uploaded from private
computers on the network. It is observed that the framework is helpful in processing large size data in less time
as compared to single system.
Method and apparatus for using documents written in a markup language to acce...Tal Lavian Ph.D.
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. An XML engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The XML engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
https://www.google.com/patents/US7313608?dq=US+7313608&hl=en&sa=X&ei=9nVSVO3GIIKB8QW19oDgDQ&ved=0CB8Q6AEwAA
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8341257?dq=US+8341257&hl=en&sa=X&ei=Zm1SVMvBD6OimQXAsYKQDw&ved=0CB0Q6AEwAA
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US8078708?dq=US+8078708&hl=en&sa=X&ei=mnFSVOLRNI2A8QXyt4GgBA&ved=0CB8Q6AEwAA
Method and apparatus for preconditioning data to be transferred on a switched...Tal Lavian Ph.D.
Data may be preconditioned to be transferred on a switched underlay network to alleviate the data access and transfer rate mismatch, so that large files may be effectively transferred on the network at optical networking speeds. A data meta-manager service may be provided on the network to interface a data source and/or data target to prepare a data file for transmission, such as by dividing a large file into multiple pieces and causing those pieces to be stored on multiple storage subsystems. The file may then be read from the multiple storage subsystems simultaneously and multiplexed onto scheduled resources on the network. This enables the high bandwidth transfer resource to be filled by a data transfer without requiring the storage subsystem to be augmented to output the data at the network transfer rate. The file may be de-multiplexed at the data target to one or more storage subsystems.
https://www.google.com/patents/US20050076173?dq=20050076173&hl=en&sa=X&ei=2eJVVJShKdPbuQSjsIDoAQ&ved=0CB8Q6AEwAA
Distributed Framework for Data Mining As a Service on Private CloudIJERA Editor
Data mining research faces two great challenges: i. Automated mining ii. Mining of distributed data.
Conventional mining techniques are centralized and the data needs to be accumulated at central location. Mining
tool needs to be installed on the computer before performing data mining. Thus, extra time is incurred in
collecting the data. Mining is 4 done by specialized analysts who have access to mining tools. This technique is
not optimal when the data is distributed over the network. To perform data mining in distributed scenario, we
need to design a different framework to improve efficiency. Also, the size of accumulated data grows
exponentially with time and is difficult to mine using a single computer. Personal computers have limitations in
terms of computation capability and storage capacity.
Cloud computing can be exploited for compute-intensive and data intensive applications. Data mining
algorithms are both compute and data intensive, therefore cloud based tools can provide an infrastructure for
distributed data mining. This paper is intended to use cloud computing to support distributed data mining. We
propose a cloud based data mining model which provides the facility of mass data storage along with distributed
data mining facility. This paper provide a solution for distributed data mining on Hadoop framework using an
interface to run the algorithm on specified number of nodes without any user level configuration. Hadoop is
configured over private servers and clients can process their data through common framework from anywhere in
private network. Data to be mined can either be chosen from cloud data server or can be uploaded from private
computers on the network. It is observed that the framework is helpful in processing large size data in less time
as compared to single system.
Method and apparatus for using documents written in a markup language to acce...Tal Lavian Ph.D.
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. An XML engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The XML engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
https://www.google.com/patents/US7313608?dq=US+7313608&hl=en&sa=X&ei=9nVSVO3GIIKB8QW19oDgDQ&ved=0CB8Q6AEwAA
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESneirew J
ABSTRACT
Data in the cloud is increasing rapidly. This huge amount of data is stored in various data centers around the world. Data deduplication allows lossless compression by removing the duplicate data. So, these data centers are able to utilize the storage efficiently by removing the redundant data. Attacks in the cloud computing infrastructure are not new, but attacks based on the deduplication feature in the cloud computing is relatively new and has made its urge nowadays. Attacks on deduplication features in the cloud environment can happen in several ways and can give away sensitive information. Though, deduplication feature facilitates efficient storage usage and bandwidth utilization, there are some drawbacks of this feature. In this paper, data deduplication features are closely examined. The behavior of data deduplication depending on its various parameters are explained and analyzed in this paper.
A novel cache resolution technique for cooperative caching in wireless mobile...csandit
Cooperative caching is used in mobile ad hoc networks to reduce the latency perceived by the
mobile clients while retrieving data and to reduce the traffic load in the network. Caching also
increases the availability of data due to server disconnections. The implementation of a
cooperative caching technique essentially involves four major design considerations (i) cache
placement and resolution, which decides where to place and how to locate the cached data (ii)
Cache admission control which decides the data to be cached (iii) Cache replacement which
makes the replacement decision when the cache is full and (iv) consistency maintenance, i.e.
maintaining consistency between the data in server and cache. In this paper we propose an
effective cache resolution technique, which reduces the number of messages flooded in to the
network to find the requested data. The experimental results gives a promising result based on
the metrics of studies.
DWDM-RAM: Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
Advances in Grid technology enable the deployment of data-intensive distributed applications, which require moving Terabytes or even Petabytes of data
between data banks. The current underlying networks cannot provide dedicated links with adequate end-to-end sustained bandwidth to support the requirements of these Grid applications. DWDM-RAM1 is a novel service-oriented architecture, which harnesses the enormous bandwidth potential of optical networks and demonstrates their on-demand nsage on the OMNlnet. Preliminary experiments suggest that dynamic optical networks, such as the OMNlnet, are the ideal option for transferring such massive amounts of data. DWDM-RAM incorporates an OGSI/OGSA compliant service interface and will promote greater convergence between dynamic optical networks and data intensive Grid computing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...CSCJournals
Tree-based data aggregation suffers from increased data delivery time because the parents must wait for the data from their leaves. In this paper, we propose an Efficient Tree-based Aggregation and Processing Time (ETAPT) algorithm using Appropriate Data Aggregation and Processing Time (ADAPT) metric. A tree structure is built out from the sink, electing sensors having the highest degree of connectivity as parents; others are considered as leaves. Given the maximum acceptable latency, ETAPT's algorithm takes into account the position of parents, their number of leaves and the depth of the tree, in order to compute an optimal ADAPT time to parents with more leaves, so increasing data aggregation gain and ensuring enough time to process data from leaves. Simulations were performed in order to validate our ETAPT. The results obtained show that our ETAPT provides a higher data aggregation gain, with lower energy consumed and end-to-end delay compared to Aggregation Time Control (ATC) and Data Aggregation Supported by Dynamic Routing (DASDR).
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US20140012991?dq=US+20140012991&hl=en&sa=X&ei=JrZXVJmkEIaJuASAzILwDw&ved=0CB8Q6AEwAA
Method and apparatus for automated negotiation for resources on a switched un...Tal Lavian Ph.D.
A resource negotiation service is provided to enable business logic decisions to be made when obtaining switched underlay network resources, to interface business logic with network conditions and schedules. The resource negotiation service may be implemented as a web service or other network service to enable business logic to be used in the selection of available network resources. This may allow policy to be used on both the subscriber side and the network provider side to optimize network resource allocations for a proposed transfer. The policy may include subscriber policy, network policy, and other factors such as current and expected network conditions. The resource negotiation service may include an interface to enable existing subscribers and new customers to obtain switched underlay resources.
https://www.google.com/patents/US20050076339?dq=20050076339&hl=en&sa=X&ei=8eFVVKDeHsOIuAT2soCAAg&ved=0CB8Q6AEwAA
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESneirew J
ABSTRACT
Data in the cloud is increasing rapidly. This huge amount of data is stored in various data centers around the world. Data deduplication allows lossless compression by removing the duplicate data. So, these data centers are able to utilize the storage efficiently by removing the redundant data. Attacks in the cloud computing infrastructure are not new, but attacks based on the deduplication feature in the cloud computing is relatively new and has made its urge nowadays. Attacks on deduplication features in the cloud environment can happen in several ways and can give away sensitive information. Though, deduplication feature facilitates efficient storage usage and bandwidth utilization, there are some drawbacks of this feature. In this paper, data deduplication features are closely examined. The behavior of data deduplication depending on its various parameters are explained and analyzed in this paper.
A novel cache resolution technique for cooperative caching in wireless mobile...csandit
Cooperative caching is used in mobile ad hoc networks to reduce the latency perceived by the
mobile clients while retrieving data and to reduce the traffic load in the network. Caching also
increases the availability of data due to server disconnections. The implementation of a
cooperative caching technique essentially involves four major design considerations (i) cache
placement and resolution, which decides where to place and how to locate the cached data (ii)
Cache admission control which decides the data to be cached (iii) Cache replacement which
makes the replacement decision when the cache is full and (iv) consistency maintenance, i.e.
maintaining consistency between the data in server and cache. In this paper we propose an
effective cache resolution technique, which reduces the number of messages flooded in to the
network to find the requested data. The experimental results gives a promising result based on
the metrics of studies.
DWDM-RAM: Enabling Grid Services with Dynamic Optical NetworksTal Lavian Ph.D.
Advances in Grid technology enable the deployment of data-intensive distributed applications, which require moving Terabytes or even Petabytes of data
between data banks. The current underlying networks cannot provide dedicated links with adequate end-to-end sustained bandwidth to support the requirements of these Grid applications. DWDM-RAM1 is a novel service-oriented architecture, which harnesses the enormous bandwidth potential of optical networks and demonstrates their on-demand nsage on the OMNlnet. Preliminary experiments suggest that dynamic optical networks, such as the OMNlnet, are the ideal option for transferring such massive amounts of data. DWDM-RAM incorporates an OGSI/OGSA compliant service interface and will promote greater convergence between dynamic optical networks and data intensive Grid computing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...CSCJournals
Tree-based data aggregation suffers from increased data delivery time because the parents must wait for the data from their leaves. In this paper, we propose an Efficient Tree-based Aggregation and Processing Time (ETAPT) algorithm using Appropriate Data Aggregation and Processing Time (ADAPT) metric. A tree structure is built out from the sink, electing sensors having the highest degree of connectivity as parents; others are considered as leaves. Given the maximum acceptable latency, ETAPT's algorithm takes into account the position of parents, their number of leaves and the depth of the tree, in order to compute an optimal ADAPT time to parents with more leaves, so increasing data aggregation gain and ensuring enough time to process data from leaves. Simulations were performed in order to validate our ETAPT. The results obtained show that our ETAPT provides a higher data aggregation gain, with lower energy consumed and end-to-end delay compared to Aggregation Time Control (ATC) and Data Aggregation Supported by Dynamic Routing (DASDR).
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
Abstract The Cloud computing is the process of storing the data in the Remote server. This process doesn‘t speak much about confidentiality and robustness of the data. To improve the security and confidentiality the uploaded file from a data owner is splitted into multiple packets and stored in multiple cloud servers. These packets are encrypted using the primary key. These different keys are also distributed in multiple key servers. User id is appended for verification. If the data owner forwards the file then the keys are verified for the data access. In this we are proposing sending the secret key as SMS to the shared or forwarded nodes for the process of proper Security. This technique integrates the concepts of encryption, encoding and forwarding. Keywords-cloud computing, encryption, storage system
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
Abstract
These days, in every field there is gigantic utilization of computerized substance. Data took care of on web and mixed media system framework is in advanced structure. Computerized watermarking is only the innovation in which there is inserting of different data in advanced substance, which we need to shield from illicit replicating. Computerized picture watermarking is concealing data in any structure (content, picture, sound and video) in unique picture without corrupting its perceptual quality. On the off chance that of Discrete Wavelet Transform (DWT), deterioration of the first picture is completed to insert the watermark. Moreover, if there should arise an occurrence of cross breed system (DWT-SVD) firstly picture is decayed by and after that watermark is installed in solitary qualities acquired by application of Singular Value Decomposition (SVD). DWT and SVD are utilized in combination to enhance the nature of watermarking. We have the procedures which are looked at on the premise of Peak Signal to Noise Ratio (PSNR) esteem at various benefits of scaling component; high estimation of PSNR is coveted because it displays great intangibility of the strategy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Grid Proxy Architecture for Network Resources (GPAN) is proposed to allow Grid applications to access resources shared in communication network domains. GPAN bridges Grid services serving user applications and network services controlling network devices through its proxy functions such as resource data and management proxies. Working with Grid resource index and broker services, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources such as bandwidth for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. Resource-based XML messaging is employed for the GPAN proxy communication.
https://www.google.com/patents/US20140012991?dq=US+20140012991&hl=en&sa=X&ei=JrZXVJmkEIaJuASAzILwDw&ved=0CB8Q6AEwAA
Method and apparatus for automated negotiation for resources on a switched un...Tal Lavian Ph.D.
A resource negotiation service is provided to enable business logic decisions to be made when obtaining switched underlay network resources, to interface business logic with network conditions and schedules. The resource negotiation service may be implemented as a web service or other network service to enable business logic to be used in the selection of available network resources. This may allow policy to be used on both the subscriber side and the network provider side to optimize network resource allocations for a proposed transfer. The policy may include subscriber policy, network policy, and other factors such as current and expected network conditions. The resource negotiation service may include an interface to enable existing subscribers and new customers to obtain switched underlay resources.
https://www.google.com/patents/US20050076339?dq=20050076339&hl=en&sa=X&ei=8eFVVKDeHsOIuAT2soCAAg&ved=0CB8Q6AEwAA
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
A flexible, efficient and secure networking architecture is required in order to process big data. However,
existing network architectures are mostly unable to handle big data. As big data pushes network resources
to the limits it results in network congestion, poor performance, and detrimental user experiences. This
paper presents the current state-of-the-art research challenges and possible solutions on big data
networking theory. More specifically, we present the state of networking issues of big data related to
capacity, management and data processing. We also present the architectures of MapReduce and Hadoop
paradigm with research challenges, fabric networks and software defined networks (SDN) that are used to
handle today’s idly growing digital world and compare and contrast them to identify relevant problems and
solutions.
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
A flexible, efficient and secure networking architecture is required in order to process big data. However,
existing network architectures are mostly unable to handle big data. As big data pushes network resources
to the limits it results in network congestion, poor performance, and detrimental user experiences. This
paper presents the current state-of-the-art research challenges and possible solutions on big data
networking theory. More specifically, we present the state of networking issues of big data related to
capacity, management and data processing. We also present the architectures of MapReduce and Hadoop
paradigm with research challenges, fabric networks and software defined networks (SDN) that are used to
handle today’s idly growing digital world and compare and contrast them to identify relevant problems and
solutions.
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
A flexible, efficient and secure networking architecture is required in order to process big data. However, existing network architectures are mostly unable to handle big data. As big data pushes network resources
to the limits it results in network congestion, poor performance, and detrimental user experiences. This paper presents the current state-of-the-art research challenges and possible solutions on big data networking theory. More specifically, we present the state of networking issues of big data related to
capacity, management and data processing. We also present the architectures of MapReduce and Hadoop paradigm with research challenges, fabric networks and software defined networks (SDN) that are used to handle today’s idly growing digital world and compare and contrast them to identify relevant problems and solutions.
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network. Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
https://www.google.com/patents/US20050076336?dq=20050076336&hl=en&sa=X&ei=e-JVVOb3J8G0uATNmILgAQ&ved=0CB8Q6AEwAA
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
Taiz University (TU) has a hundreds of computing resources on different campuses for use in areas from offices work to general access student labs. However, these resources are not used to their full potential. Grid computing is a technology that is capable to unify these resources and utilize them in very significant way. The difficulties of funding a complete grid computing environment and also, the difficulties of grid tools makes teachers and researchers in TU unable to involve in teaching and research in grid computing or in distributed computing. These problems raised up our awareness to mitigate this problem by build a simple environment for Grid
computing from resources are available in TU and the built environment we can use it for teaching and research.
The objective of this paper is to build, implement and testing a grid computing environment (Globus Toolkit). To achieving this objective we built the hardware and software parts, and configured several basic grid services commands line and web portal. The test result for basic grid services have been indicated that our proposed grid computing model is promising and can use in teaching and research in TU. The paper takes a look at how grid computing is realizing this aim and have created unbelievable opportunities for students, teachers and
researchers at TU in addition the result of this paper will make TU a pilot to the other universities in whole Yemen in field of Grid and distributing computing.
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
Network resources allocated for particular application traffic are aware of the characteristics of L4+ content to be transmitted. One embodiment of the invention realizes network resource allocation in terms of three intelligent modules, gateway, provisioning and classification. A gateway module exerts network control functions in response to application requests for network resources. The network control functions include traffic path setup, bandwidth allocation and so on. Characteristics of the content are also specified in the received application network resource requests. Under request of the gateway module, a provisioning module allocates network resources such as bandwidth in optical networks and edge devices as well. An optical network resource allocation leads to a provisioning optical route. Under request of the gateway module, a classification module differentiates applications traffic according to content specifications, and thus creates and applies content-aware rule data for edge devices to forward content-specified traffic towards respective provisioning optical routes.
https://www.google.com/patents/US7944827?dq=US+7944827&hl=en&sa=X&ei=-XJSVPLjF8Kn8AXtz4G4Cw&ved=0CB8Q6AEwAA
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
Similar to Grid proxy architecture for network resources (20)
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Embodiments of the present invention present a method and apparatus for photonic line sharing for high-speed routers. Photonic switches receive high-speed optical data streams and produce the data streams to a router operating according to routing logic and produce optical data streams according to destination addresses stored in the data packets. Each photonic switch can be configured as one of a 1:N multiplexer or an M:N cross-connect switch. In one embodiment, optical data is converted to electrical data prior to routing, while an alternate embodiment routes only optical data. Another embodiment transfers large volumes of high-speed data through an optical bypass line in a circuit switched network to bypass the switch fabric thereby routing the data packets directly to the destination. An edge device selects one of the packet switched network or the circuit switched network. The bypass resources are released when the large volume of high-speed data is transferred.
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
Embodiments of the invention provide for providing support for sharing and exchanging in a network. The system includes a memory coupled to a processor. The memory includes a database comprising information corresponding to first users and the second users. Each of the first users and the second users are facilitated for sharing or exchanging activity, service or product, based on one or more conditions corresponding thereto. Further, the memory includes one or more instructions executable by the processor to match each of the first users to at least one of the second users. Furthermore, the instructions may inform each of the first users about the match with the at least one of the second users when all the conditions are met by the at least one second user based on the information corresponding to each of the second users.
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systems and methods for electronic communicationsTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things. The system includes a processor, and a memory coupled to the processor. The memory includes a database having one or more options corresponding to each of the Internet of Things. The memory further includes instructions executable by the processor to share at least one of the one or more options with one or more users of the things. Further, the instructions receive information corresponding to selection of the at least one option by the one or more users. Additionally, the instructions update the database based on the selection of the at least one option by the one or more users. Further, a device for enhancing interaction with the things is also disclosed.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
An object detection system for autonomous vehicle, comprising a radar unit and at least one ultra-low phase noise frequency synthesizer, is provided. The radar unit configured for detecting the presence and characteristics of one or more objects in various directions. The radar unit may include a transmitter for transmitting at least one radio signal; and a receiver for receiving the at least one radio signal returned from the one or more objects. The ultra-low phase noise frequency synthesizer may utilize Clocking device, Sampling Reference PLL, at least one fixed frequency divider, DDS and main PLL to reduce phase noise from the returned radio signal. This proposed system overcomes deficiencies of current generation state of the art Radar Systems by providing much lower level of phase noise which would result in improved performance of the radar system in terms of target detection, characterization etc. Further, a method for autonomous vehicle is also disclosed.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. A service engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The service engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device in accordance with a command design parameter. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Embodiments of the present invention provide a system for enhancing reliability in computation of ratings provided by a user over a social network. The system comprises of a processor and a memory coupled to the processor. The memory further comprises a rater score database, a satisfaction database, a social network registration database, a user profile database, and a plurality of instruction executable by the processor. Said instructions in the memory are enabled to accept a message from at least one user wherein said message comprises a satisfaction score associated with at least one service provider and to retrieve a rater score associated with said at least one user from said rater score database. Further, the memory includes instructions in order to compute a new satisfaction score based on said rater score and said satisfaction score and update said satisfaction database to include said new satisfaction score. In a similar manner, the new satisfaction score can be computed based upon the information stored in the social network registration database and user profile database.
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systens and Methods For Electronic CommunicationTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things in a network. The system includes a processor, and a memory. The memory includes a database including one or more options corresponding to each of the Internet of Things. Further, the memory includes instructions executable by the processor for providing the options to a user for enabling the user to select at least one option therefrom. Further, the instructions create a visual menu based on information corresponding to selection of the at least one option. The visual menu includes one or more objects corresponding to the Internet of Things. Furthermore, the instructions receive a rating for the visual menu from one or more second users of the Internet of Things. Additionally, instructions customize the visual menu based on the received rating.
Systems and Methods for Visual Presentation and Selection of IVR MenuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
Systems and Methods for Visual Presentation and Selection of IVR Menu
Grid proxy architecture for network resources
1. (12) United States Patent
Wang et al.
US008898274B2
(10) Patent No.: US 8,898.274 B2
(45) Date of Patent: *Nov. 25, 2014
(54) GRID PROXY ARCHITECTURE FOR
NETWORK RESOURCES
(71) Applicant: Microsoft Corporation, Redmond, WA
(US)
(72) Inventors: PhilWang, Nepean (CA); Indermohan
Monga,Acton, MA (US); Tal Lavian,
Sunnyvale, CA (US); Ramesh Durairaj,
Santa Clara, CA (US); Franco
Travostino, Arlington, MA (US)
(73) Assignee: Microsoft Corporation, Redmond, WA
(US)
(*) Notice: Subject to any disclaimer, the term ofthis
patent is extended or adjusted under 35
U.S.C. 154(b) by 0 days.
This patent is Subject to a terminal dis
claimer.
(21) Appl. No.: 13/725,646
(22) Filed: Dec.21, 2012
(65) Prior Publication Data
US 2014/OO12991 A1 Jan. 9, 2014
Related U.S. Application Data
(63) Continuation ofapplication No. 13/295.283, filed on
Nov. 14, 2011, now Pat. No. 8,341,257, which is a
continuation ofapplication No. 11/018,997, filed on
Dec. 21, 2004, now Pat. No. 8,078,708.
(60) Provisional application No. 60/536,668, filed on Jan.
15, 2004.
(51) Int. Cl.
G06F 5/73 (2006.01)
H04L 2/9II (2013.01)
G06F 9/50 (2006.01)
(52) U.S. Cl.
CPC ................ H04L 47/70 (2013.01); G06F 9/505
(2013.01)
USPC ............ 709/223; 709/217; 709/220; 709/224
(58) Field ofClassification Search
USPC .......... 709/201, 220, 223, 224, 217, 219, 203
Seeapplication file forcomplete search history.
(56) References Cited
U.S. PATENT DOCUMENTS
5,329,619 A * 7/1994 Page et al...................... TO9,203
7,171470 B2 1/2007 Doyle et al.
(Continued)
OTHER PUBLICATIONS
“Final OfficeAction”, U.S. Appl. No. 11/018,997. (Jun. 30, 2009), 7
page.
(Continued)
Primary Examiner— Lashonda Jacobs
(74) Attorney, Agent, or Firm — Alin Corie: Mike Allen;
Micky Minhas
(57) ABSTRACT
AGrid ProxyArchitectureforNetworkResources (GPAN)is
proposed to allow Grid applications to access resources
shared in communication network domains. GPAN bridges
Grid services serving userapplications and networkservices
controlling network devices through its proxy functions such
asresourcedataand managementproxies. WorkingwithGrid
resource index and broker services, GPAN employs distrib
uted network service peers (NSP) in network domains to
discover, negotiate and allocate network resources such as
bandwidth for Grid applications. An elected master NSP is
the unique Grid node that runs GPAN and represents the
whole network to share network resources to Grids without
Grid involvement of network devices. GPAN provides the
Grid Proxy service (GPS)to interface with Grid servicesand
applications, andthe Grid Delegation service (GDS)to inter
face with network services to utilize network resources.
Resource-based XML messaging is employed forthe GPAN
proxy communication.
20 Claims, 3 Drawing Sheets
1 NS
3 D a 1 in a st
ase
2. US 8,898.274 B2
Page 2
(56)
7,493,358
7,562,143
8,078,708
8,341,257
2004,OO15977
2004/0268293
2005/OO27785
2005/0074529
2005/0076173
2005/0076336
2005/0076339
2005, 01386.18
2006, O149842
2006, O168584
2007/0079004
2008/O1236.68
References Cited
U.S. PATENT DOCUMENTS
B2 2/2009 Keohane et al. .......
B2 7, 2009 Fellenstein et al.
B1 12/2011 Wang
B1 12/2012 Wang
A1 1/2004 Benke et al. ...........
Al 12/2004 Woodgeard
A1 2/2005 Bozak et al. ...........
A1 4/2005 Cohen et al.
A1 4/2005 Merrilet al.
A1 4/2005 Cutrell et al.
A1 4/2005 Merrilet al. ...........
A1 6, 2005 Gebhart
A1 7/2006 Dawson et al.
A1 7/2006 Dawson et al.
A1 4/2007 Tatemura et al.
A1 5, 2008 Tan et al.
OTHER PUBLICATIONS
“Non-Final Office Action”, U.S. Appl. No. 1 1/018,997, (Jan. 9,
2008), 5 pages.
“Non-Final Office Action”, U.S. Appl. No. 1 1/018.997, (Apr. 2,
2010), 6 pages.
TO9,201 Non- -->
TO9,226 Non-Final Office Action”, U.S. Appl. No. 11/018,997, (Apr. 11,
2011),9 pages.
“Non-Final Office Action”, U.S. Appl. No. 11/018,997, (Jul 21,
T18,105 2008), 6 pages.
“Non-Final Office Action”, U.S. Appl. No. 11/018,997, (Oct. 7,
TO9/200 2009), 6 pages.
42606 “Non-Final Office Action”, U.S. Appl. No. 11/018,997, (Nov. 2,
28, 2010),6pages.78, “Non-Final Office Action”, U.S. Appl. No. 13/295.283, (Jan. 4.2012), 6 pages.
“Non-Final Office Action”, U.S. Appl. No. 13/295,283, (Apr. 30,
2012), 6 pages.
“NoticeofAllowance”,U.S.Appl. No. 11/018,997,(Aug. 5, 2011), 5
pageS.
“Notice ofAllowance”, U.S. Appl. No. 13/295.283, (Aug. 24, 2012),
4 pages.
“Non-Final Office Action”, U.S. Appl. No. 11/018,997. (Jan. 6,
2009), 6 pages. * cited by examiner
3. US 8,898.274 B2Sheet 1 of 3Nov. 25, 2014U.S. Patent
...•**„º59IISN------------
Jº?seW/
t
's
wa
d
6. US 8,898,274 B2
1.
GRD PROXY ARCHITECTURE FOR
NETWORK RESOURCES
CROSS-REFERENCE TO RELATED
APPLICATIONS
This application is a continuation ofand claims priority to
U.S. patent application Ser. No. 13/295,283, filed Nov. 14,
2011 which, in turn, is a continuation ofU.S. patentapplica
tion Ser. No. 11/018,997, filed Dec. 21, 2004, entitled GRID
PROXY ARCHITECTURE FOR NETWORK
RESOURCES, andclaims priority to U.S. Provisional Patent
Application Ser. No. 60/536,668 entitled GRID PROXY
ARCHITECTURE FOR NETWORK RESOURCES, filed
Jan. 15,2004,theentiretiesofeachareincorporatedhereinby
reference.
BACKGROUND
Grid networks are emerging as the “killer application of
next-generation networks through the building of overlay
networks upon existing network infrastructures for the pur
poses ofnetwork-wide computing and data collaboration. In
aGrid network,whichisalsoknownasa virtual organization,
Grid nodes are distributed widely in the physical networks
and share their available hardware and software resources
Suchas CPU, storage, data mining,and visualization centers.
Theresourcesharingisactuallyprovidedby theGridservices
running on Grid nodes. Those Grid services form the Grid
overlay over the Grid nodes as they function under the same
Grid rule.
According to the available services and resources, a Grid
userdistributesportionsofhis/herapplicationtaskintheGrid
nodesandputsthose services and resources togetherto com
plete the user task with very high performance. Benefits of
this technology include preventing resource wasting in the
network and saving the user capital expenditure on equip
ment. Typical use cases ofGrids include data-intensive and
computation-intensive business tasks such as enterprise con
current product design, utility computing, large-scale data
synchronization, and many high-performance computations
including nuclear energy simulations and long-term global
weather forecasting.
Distributed computing in general, and grid computing in
particular, is desirable because complex and resource-inten
sive computing tasks can be accomplished without purchas
ing and maintaining costly Super-computers. Rather, rela
tively small portions of the overall computing task can be
distributed among multiple computers and devices of rela
tively modest capability. It will be appreciated that the grid
networkcapability mayalsobemoreeasilyscalablethanhigh
performancedevices and Super-computers. Further,thereis a
potential business model for the rental ofgrid services.
The dispersed Grid nodesareconnectedby network infra
structure Such as the Internet. Grid nodes include computers,
data servers and network devices. Resource sharing of net
work devices in a Grid is critical because it provides the
interconnectivityofGrid nodes toform apipelineofresource
supply in the Grid. In other words, interconnectivity enables
reliable sharing of resources such as computing power and
data services.
One problem hindering the advance ofGrid technology is
that the requisite resource sharing of network nodes is not
entirely supported by traditional networks. First, Grid nodes
generally require a piece ofGrid software installed on each
Grid node. While this installation is relatively easy onacom
puter,itcanbeimpracticalon networkdevicessuchasrouters
10
15
25
30
35
40
45
50
55
60
65
2
and Switches. Without installation of the Grid software, a
network device cannotpurposefully make its resource avail
able to the Grid, and a Grid node cannot access a network
device through the same Grid rule.
Another problem hindering the advance ofGrid technol
ogy is that network devices are typically located in autono
mous network domains, and controlled by network manage
ment facilities such as network managers and services. The
network management facilities form an actual overlay net
workwhich is the networkserviceoverlay and gives theAPI
for network control functions. In other words, the network
service overlay consists ofnetwork services thatare running
on network devices. Thus, in a Grid network, there are two
overlay networks: the network service overlay and the Grid
serviceoverlay. Butthereisagapbetweenthesetwooverlays.
The gap is that they are not compatible because network
services and Grid services use different service infrastruc
tures. Moreover, due to the modest capability of CPU and
memory on network devices, network services are generally
implemented in lightweight network software while Grid
services are generally implemented in heavyweight Software
and thus require much more CPU power and storage.
It would therefore be desirable to have a technique for
causing the two overlays to work together. In other words,
network nodes should be capable ofacting as Grid nodes in
order to provide its resources such as network links and
bandwidth in a Grid.
SUMMARY
Thepresentinvention overcomestheabove-mentionedand
other drawbacks by providing a Grid-based proxy mecha
nism to allow Grid services and applications to access and
utilize resources available in the physical network domains.
In accordance with the invention, a Grid Proxy Architecture
forNetwork Resources(“GPAN)bridgesagrid servicesover
lay that includes ofGrid services to serve user applications,
with a network services overlay that includes network ser
vices to control the network devices. TheGPAN proxy gives
the Grid services in the Grid Service overlay thepotential to
accessthe networkservices intheNetworkServiceoverlayin
order to control the networks for resource use. With GPAN,
network nodes do not need to install and run a piece ofGrid
service software in order to provide their resources to the
Grids. Network nodes are represented in a whole by the
GPAN proxy and joined the Grids by a unique Grid node
which runs the actual proxy Software/system.
Inoneembodimentoftheinvention,GPANworkswiththe
networkservice overlay to gather networkresourceinforma
tion and provide that information to the Grid resource index
service within the Grid network. GPAN may also facilitate
brokerage and reservation of network resources upon the
request of a Grid resource broker service within the Grid
network by translating application requests from the Grid
services to networkoperations ofthe network services.
Inoneembodimenttheinvention employs networkservice
peers/agents (“NSPs') distributed in the network domains in
order to obtain network resource information and allocate
network resources for the Grids. Each NSP may include an
individual network domain, including various Sub-nets, and
maybeoperatedby a differentserviceprovider.Ofthe NSPs,
only the master NSP executes the GPAN proxy in a Grid
network. The master NSP is usually selected from an NSP
which is close to the location where run Grid resource ser
vices suchas index, brokerandscheduler.A masterNSPmay
beelectedbasedon how theGridis organizedandhoweasily
the Grid accesses the network resources. Under the GPAN
7. US 8,898,274 B2
3
proxy, the master NSP sends network instructions to each
NSP for resource operations such as information collection
and allocation. Further, the masterNSPprovides Grid-based
proxyAPIs ofresourceoperations to Gridservices andappli
cations.Consequently,thenoderunningthemasterNSPisthe
unique Grid node representingthe whole networks.TheGrid
services and applications talk to this master NSP node for
networkresource supply. TheyusetheGPANAPIswhichare
provided in the form ofGrid services to access the network
resources. Itwill thereforebeapparentthat noactual network
nodes need to execute native grid protocols.
In one embodiment of the invention GPAN provides at
least two proxy functions, resource data proxy and resource
management proxy. The resource data proxy function is to
provideresourcediscovery,status (create/destroy/use),avail
ability and servicepolicy for theGrid network. The resource
management proxy function provides resource scheduling,
newfallocate/reallocate/release in the Grid network. GPAN
sends resource information to the global Grid resource ser
vices such as index, through the resource data proxy. GPAN
receivesresourceallocationrequestsofGridapps fromaGrid
resource broker or scheduler service through the resource
managementproxy. Each proxy function may implementdif
ferent proxy mechanisms. For example, the resource data
proxy implements a network information provider (“NIP')
which is a Grid-based software to facilitate collection of
network information and provide updates and reports to the
Gridresourceindexservice.Theresourcemanagementproxy
function implements a resource allocation and management
provider (“RAMP) which is also a Grid-based software to
receive resource allocation requests from the Grid broker/
meta-schedulerservices and schedule resource operations in
the communications network.
In one embodiment of the invention GPAN includes two
main components: a Grid Proxy service (“GPS) and a Grid
Delegationservice(“GDS”). GPSinterfacestheGPANproxy
with the Grid overlay ofGrid services to meet applications.
GDS interfaces the proxy with the Network Service overlay
of network services to utilize network resources. Resource
based XML messaging may be utilized for communication
between GPS and GDS.
By implementing at least some of the features described
above, GPAN advantageously causes the communications
network to appear as grid resources from the perspective of
the grid network. Forexample, the resource availability data
is periodically gathered from each network service peer and
provided to an index ofthe grid network in a format that is
compliant with the protocols utilized by the index. Further,
GPANimplementsanAPIthatiscompliantwiththesignaling
utilized by the grid manager in order to facilitate resource
brokerage and reservation. Following receipt of a request
from the Grid application, and identification of requisite
resource from the index, a broker/meta-schedulerofthegrid
network signals to the grid resources and GPAN in order to
reserve and utilize the resources. The broker/meta-scheduler
signals forresourcereservationtoboththegridresourcesand
GPAN in the same, grid-standard compliant manner. GPAN
implements anAPI which is operativetotranslatecommands
from the broker/meta-scheduler into a format that may be
utilized by the communications network nodes. Conse
quently, two-way communications between the network
resources and grid manager are possible, thereby enabling
operations such as bandwidth allocation, negotiation, agree
ment, information feedback, and status tracking Once the
appropriate communications network and grid network
resources are made available forthe application, portions of
10
15
25
30
35
40
45
50
55
60
65
4
the overall task are distributed to the grid resource services
eitherdirectly by the broker/meta-scheduleror via GPAN.
BRIEF DESCRIPTION OF THE FIGURES
FIG. 1 is a block diagram of grid network architecture
illustrating gathering of communications network resource
information for the grid resource index by GPAN.
FIG. 2 illustrates reservation ofcommunications network
resources in the architecture of FIG. 1.
FIG. 3 is a blockdiagram that illustrates the GPAN proxy
in greater detail.
DETAILED DESCRIPTION
Referringto FIG. 1, agridcomputing networkarchitecture
includes multiple grid resources that are in communication
via multiple communications network elements. The grid
resources may includeagridresource manager 100, comput
ing resource provider102, 104and storage resourceprovider
106. The grid manager, computing resource provider and
storage resource providerexecute Grid-based Resource Ser
vices (GRS) such as Resource Management Services (RMS)
and Resource Data Services (RDS). The communications
network elements include various Switching and routing
devices which make up network services peers (“NSPs')
108-114, and a master network service peer 116 that imple
ments a Grid Proxy Architecture for Network Resources
(“GPAN') 118 for the grid network. An application device
120whichoriginatesarequestforexecution ofanapplication
on the grid communicates with thegrid networkthrough the
grid manager 100.
The grid manager 100 manages grid-enabled resources
sharedin theGrid networkto userapplications. It may usean
index node 122 which is operativetoexecutegridcomputing
protocolstoproducean indexofavailablegrid resources. For
example, the index may include address information and an
indication of availability for each grid resource through
respective RDS on each resource provider. It may also use a
grid broker/meta-scheduler 124 which is operative in
response to a request from the application node 120 to iden
tifyasetofgridresourcesfromtheindex withwhichtosatisfy
the application request. Once the set of grid resources is
determined, the broker/meta-scheduler signals the grid
resourcestopreparethemtobeutilized. Forexample,thegrid
resources may be verifiedasavailable, reserved,and charges
forthe services may bearranged. Oncethegrid resourcesare
prepared, thebroker/meta-scheduler 124 distributes portions
of the overall task to individual ones of the grid services
through respective RMS in each resource provider. The bro
ker/meta-scheduler is also operative to coordinate responses
from the grid services 102-106 for the particularapplication
task.
The GPAN 118 is executed at least in-part by the master
network service peer 116 and is operative to cause the com
munications network to appear, relative to the grid manager
100, as a grid-compliant resource provider of network. One
function ofthe GPAN 118 is to gather communications net
work resource information on behalf ofthe index 122. Data
indicating theavailability ofnetworkresources such as NSPs
108-114 can be actively gathered using any ofa variety of
networkprotocols. Suchas simple network managementpro
tocol (“SNMP).Alternatively, somenetworkdevices maybe
configuredtoautomaticallyprovideresourceavailabilitydata
to the GPAN. In addition to obtaining resource availability
data, the GPAN 118 generates a mapping of the available
resources, including the various communications network
8. US 8,898,274 B2
5
nodes and links which interconnect the grid resources. The
resourceavailabilityinformation and mappingarethentrans
latedintoaformatthatcanbeprocessedbytheindex 122,and
transmitted to the index for storage. The information in the
index can then be processed by the broker/meta-scheduler
124 in a Substantially similar manner as normally generated
and stored grid resource information.
Referring now to FIG. 2, theGPAN118also implements its
Grid serviceAPI so that it can be accessed by the grid man
ager 124 though standard Grid service invocation in orderto
facilitate resource brokerage and reservation. Following
receipt ofa request from the application 120 and identifica
tion of requisite resource from the index 122, the broker/
meta-scheduler124signals tothegrid resources 102-106and
the GPAN 118 in order to reserve and utilize the identified
resources. In particular, the broker/meta-scheduler 124 sig
nalsforresourcereservationtoboththegridresourcesandthe
GPAN in the same, grid-standard compliant manner. The
GPAN 118 is operative to translate the signaled commands
fromthebroker/meta-scheduler 124intoaformatthatmaybe
utilizedby thecommunications network nodes ofNSPs 108
114. Further, the GPAN is operative to translate messages
returned from the network nodes ofthe NSPs to the broker/
meta-scheduler. Consequently, two-way communications
between the network resources and grid manager are pos
sible. Communications between the network resources and
grid managermay supportoperationssuchasbandwidthallo
cation, negotiation, agreement, information feedback, and
status tracking Once the appropriate communications net
work and grid network resources are made available for the
tasksenttothegrid,portionsoftheoveralltaskaredistributed
to the grid resource services either directly by the broker/
meta-scheduler or via the GPAN.
Referring now to FIGS. 2 and 3, the GPAN 118 includes
two main components: a Grid Delegation Service (“GDS)
300 and a Grid Proxy Service (“GPS) 302. The GPS 302 is
operative to accept network resource requests from upper
layer grid services in the Grid Service overlay such as the
broker/meta-scheduler124a, index 122a,andenduserappli
cation 120a. Resource requests include requests for resource
information, resource allocation, and related operations. The
GPS 302 passes those requests to the GDS 300, and returns
feedback received in response to the requests back to the
request initiator. The GDS processes the resource requests
from the GPS to determine which NSPs 108-114 in the Net
workServiceoverlay are indicatedtobepartoftheparticular
grid operation. The GDS also collects resource information
and results from the NSPs for return to the GPS. As shown
specifically in FIG. 3, the GPS and GDS components ofthe
GPAN logically reside on two overlay networks: GPS on the
GridServiceOverlayandGDSontheNetworkServiceOver
lay. But they may reside on ahost Such as the masterservice
peerortwo differenthosts. Forexample,GPS 302 can reside
in a grid-based hosting environment that is logically proxi
mate to the grid manager100 (FIG. 2), and theGDS 300 can
reside in a network service hosting environment that is logi
callyproximate to the masternetworkservicepeer 116 (FIG.
2). Consequently, GPS is the GPANcontactpoint in thegrid
networkoverlay whileGDS is the GPAN contactpoint in the
network service overlay.
The GPAN 118 may provide respective network resource
provider as necessary and appropriate. For example, a net
work information provider(“NIP)304 facilitates collection
of network information and provides updates and reports to
the grid manager index. A resource allocation and manage
ment provider (“RAMP) 306 may receive resource alloca
10
15
25
30
35
40
45
50
55
60
65
6
tion requests from the broker/meta-scheduler and provide
scheduling resources in the communications network.
While the invention is described through the above exem
plaryembodiments,itwillbe understoodbythoseofordinary
skill in the art that modification to and variation ofthe illus
trated embodiments maybe madewithoutdeparting from the
inventiveconceptshereindisclosed. Moreover, whilethepre
ferredembodiments are described in connection with various
illustrativestructures,oneskilledintheartwillrecognizethat
the system may beembodied usinga variety ofspecific struc
tures. Accordingly, the invention should not be viewed as
limitedexceptby the scope andspiritoftheappendedclaims.
What is claimed is:
1. A method ofSupporting operation ofa plurality ofdis
tributed computing resources interconnected by a communi
cation network, the method comprising:
receiving information indicative ofavailability ofat least
Some resources of the communication network, the
information being in a Supply format;
translating at least Some ofthe received information from
theSupplyformattoatargetformatusablebyatleastone
ofthe distributed computing resources; and
providingatleastsome ofthetranslated information in the
target format to the at least one ofthe distributed com
puting resources to enable analysis ofavailability ofat
least Some resources ofthe communication network by
the at least one of the distributed communications
resources,
wherein the Supply format is a communications network
format not directly readable by the at least one of the
distributed computing resources; and
the information indicative ofavailability ofat least some
resources comprises information indicative ofavailable
bandwidth between particularnodesofthecommunica
tion network.
2. The method ofclaim 1, further comprising:
receiving at least one message from at least one of the
distributed computing resources;
processing the received at least one message to derive at
leastone commandusablebyatleastoneresourceofthe
communication network; and
providing the at least one command to the at least one
resource ofthe communication network.
3. The method ofclaim 2, wherein the receiving, translat
ingandprovidinginformation,andthereceivingandprocess
ing messagesandprovidingcommandsderivedfromthemes
sages Supporttwo-way communications between the at least
one computing resource and the at least one resource ofthe
communication network.
4. The method ofclaim3, wherein thetwo-waycommuni
cations Supportatleastoneoperation fromagroup consisting
of:
bandwidth negotiation, bandwidth allocation, bandwidth
agreement, status tracking, and information feedback.
5. An apparatus for Supporting operation ofa plurality of
distributedcomputingresourcesinterconnectedbyacommu
nication network, the apparatus comprising:
a communication network interface operating to receive
information indicative of availability of at least some
resources ofthe communication network, the informa
tion being in a Supply format;
a processor operating to translate at least some of the
received information from the Supply format to a target
format usable by at least one ofthe distributedcomput
ing resources; and
acomputing resourceinterfaceoperatingtoprovideatleast
Someofthetranslated informationinthetargetformatto
9. US 8,898,274 B2
7
theatleastoneofthedistributedcomputingresourcesto
enableanalysis ofavailabilityofatleastsomeresources
ofthe communication network by the atleast oneofthe
distributed communications resources;
wherein the supply format is a communications network 5
format not directly readable by the at least one of the
distributed computing resources; and
the information indicative ofavailability ofat least some
resources comprises information indicative ofavailable
bandwidth betweenparticularnodesofthecommunica
tion network.
6. The apparatus ofclaim 5, wherein:
the computing resource interface further operates to
receive a message from at least one of the distributed
computing resources;
the processor further operates to process the received at
leastonemessageto deriveatleastonecommandusable
by at leastone resource ofthe communication network;
and
the communication network interface further operates to
provide the at least one command to the at least one
resource ofthe communication network.
7. The apparatus ofclaim 6, wherein the communication
10
15
network interface, the computing resource interface and the
processor furthercooperatively operate to: 25
receive, translate and provide information;
receive and process messages; and
provide commands derived from the messages to support
two-way communicationsbetween theat leastonecom
puting resource and the at least one resource of the
communication network.
8.Theapparatusofclaim 7,whereinthetwo-way commu
30
nicationssupportatleastone operationfrom agroupconsist
ing of
bandwidth negotiation, bandwidth allocation, bandwidth 35
agreement, status tracking, and information feedback.
9.Acomputerprogramproduct forsupportingoperationof
aplurality ofdistributedcomputingresources interconnected
byacommunication network, thecomputerprogram product
comprising: 40
logic operating to receive information indicative ofavail
ability ofat least some resources ofthe communication
network, the information being in a supply format;
logic operating to translate at least some ofthe received
information from the supply format to a target format
usable by at least one of the distributed computing
resources; and
logic operating to provide at least some ofthe translated
informationin thetarget format to theatleastoneofthe
distributed computing resources to enable analysis of 50
availability ofat least some resources ofthe communi
cation network by the at least one of the distributed
communications resources,
45
8
wherein the supply format is a communications network
format not directly readable by the at least one of the
distributed computing resources; and
the information indicative ofavailability ofat least some
resources comprises information indicative ofavailable
bandwidth betweenparticularnodesofthe communica
tion network.
10. The computer program product of claim 9, further
comprising:
logicoperatingto receivea message fromatleastoneofthe
distributed computing resources;
logicoperatingtoprocessthereceivedatleastonemessage
to derive at least one command usable by at least one
resource ofthe communication network; and
logic operatingto provide theat leastone command to the
at least one resource ofthe communication network.
11. The computer program product ofclaim 10, wherein
the logic operable to receive, translate and provide informa
tion, and the logic operable to receive and process messages
andtoprovidecommandsderivedfromthemessagessupport
two-waycommunicationsbetweentheatleastonecomputing
resource and the at least one resource ofthe communication
network.
12. The computer program product ofclaim 11, wherein
the two-way communications supportat least one operation
from a group consisting of:
bandwidth negotiation, bandwidth allocation, bandwidth
agreement, status tracking, information feedback.
13. The method of claim 1, wherein the supply format
comprisesaSimpleNetworkManagementProtocol(SNMP).
14. The method of claim 1, wherein the at least some
resourcesareassociatedwith one ormore distributed network
service peers (NSP).
15.The methodofclaim 1 furthercomprisingdistributing
portions of at least one task between at least some ofthe
particular nodes based, at least in part, on the analysisofthe
availability.
16. The apparatus ofclaim 5, wherein the supply format
comprisesaSimpleNetworkManagementProtocol(SNMP).
17. The apparatus ofclaim 5, wherein the at least some
resourcesareassociatedwith one ormore distributed network
service peers (NSP).
18.Thecomputerprogram productofclaim9, wherein the
Supply format comprises a Simple Network Management
Protocol (SNMP).
19.Thecomputerprogram productofclaim9, wherein the
at least some resources are associated with one or more dis
tributed network service peers (NSP).
20.Thecomputerprogramproductofclaim9 furthercom
prisinglogictodistributeportionsofatleastonetaskbetween
at leastsomeoftheparticularnodesbased,atleastinpart,on
the analysis ofthe availability.