The document describes Nebula, a proposed future internet architecture that aims to securely support cloud computing. It is divided into three main components: NCORE for high performance core routers, NDP for establishing secure and reliable multiple paths between data centers, and NVENT for policy-based control plane technologies. Nebula aims to provide assured delivery, controlled access, high availability, and autonomous resource control to enable applications with strong security and reliability requirements.
Dsp Project Titles, 2009 2010 Ncct Final Year Projectsncct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects
The network layer performs three main functions:
1) Path determination to route packets from source to destination.
2) Switching to move packets through routers.
3) Call setup for some architectures that require establishing a path before data transmission.
Ieee Embedded Ieee Project Titles, 2009 2010 Ncct Final Year Projectsncct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
This document discusses the evolution of network layering models from early telephone networks to modern internet architecture. It makes three key points:
1) Early telephone networks used a "beads on a string" hierarchical model that was suitable for their technology but could not represent the differing scopes required for data networks.
2) The advent of packet switching and layered network models from operating systems, like the CYCLADES architecture, introduced a new distributed computing paradigm based on independent layers of differing scope.
3) Debate emerged between the "beads on a string" telephone model and the new layered computing model, which eventually led to the TCP/IP protocols that form the basis of today's internet.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
This document provides an overview of implementing and evaluating wireless local area networks (WLANs). It discusses topics such as the wireless spectrum, physical impairments like noise and interference, medium access control, security, the IEEE 802.11 standard, and transport control protocols. The objectives are to demonstrate the implementation of a WLAN topology and evaluate its performance under various conditions using tools like Wireshark.
The document analyzes characteristics of images accessed on the web through a representative trace from a proxy server. It finds that most GIF images are small (under 6KB), while JPEG images tend to be larger. It also examines the effectiveness of different transcoding techniques for file size reduction, finding that JPEG compression and spatial geometry reduction work well for JPEGs, while naive geometry reduction can increase file size for some GIFs. Understanding image characteristics is important for choosing effective transcoding operations.
Dsp Project Titles, 2009 2010 Ncct Final Year Projectsncct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects
The network layer performs three main functions:
1) Path determination to route packets from source to destination.
2) Switching to move packets through routers.
3) Call setup for some architectures that require establishing a path before data transmission.
Ieee Embedded Ieee Project Titles, 2009 2010 Ncct Final Year Projectsncct
Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
This document discusses the evolution of network layering models from early telephone networks to modern internet architecture. It makes three key points:
1) Early telephone networks used a "beads on a string" hierarchical model that was suitable for their technology but could not represent the differing scopes required for data networks.
2) The advent of packet switching and layered network models from operating systems, like the CYCLADES architecture, introduced a new distributed computing paradigm based on independent layers of differing scope.
3) Debate emerged between the "beads on a string" telephone model and the new layered computing model, which eventually led to the TCP/IP protocols that form the basis of today's internet.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
This document provides an overview of implementing and evaluating wireless local area networks (WLANs). It discusses topics such as the wireless spectrum, physical impairments like noise and interference, medium access control, security, the IEEE 802.11 standard, and transport control protocols. The objectives are to demonstrate the implementation of a WLAN topology and evaluate its performance under various conditions using tools like Wireshark.
The document analyzes characteristics of images accessed on the web through a representative trace from a proxy server. It finds that most GIF images are small (under 6KB), while JPEG images tend to be larger. It also examines the effectiveness of different transcoding techniques for file size reduction, finding that JPEG compression and spatial geometry reduction work well for JPEGs, while naive geometry reduction can increase file size for some GIFs. Understanding image characteristics is important for choosing effective transcoding operations.
Department of Computer Application- Advanced computer network
Locations
Resource-Sharing Functions and Benefits
Resource sharing
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Cryptographic Building Blocks
Keynote @ Keynote @ II International event on Research in Computing Systems. IT Mexicali. Mexico This slide set presents the Ephemeral Wireless Networks research domain developed in Trinity College Dublin, by Johann Marquez-Barja et al.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
This document discusses the deployment of a next generation telecom transport network. The objectives are to form a network to offer both IPv6 and IPv4 services, successfully deploy an IPv6 network, and configure firewall security. It covers literature on IPv6 migration, routing protocols like OSPF, hardware configurations including routers, switches, and firewalls. It also compares IPv4 and IPv6, and discusses security techniques like DMZ. The references cited papers on IPv6 necessity, distributed firewall systems, IPv6 research and applications, and data security protocols.
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
The document discusses big data analytics and advanced computer networking scenarios, including research challenges and opportunities. It covers technical background on measurements and analysis in computer networks. It also discusses new networking architectures like Software-Defined Networking (SDN), Information-Centric Networking (ICN), and network visualization. Tools and techniques for high-performance network traffic analysis using visual analytics are also covered. The document provides an agenda for applied research opportunities in computer networking between CIn/UFPE and Dalhousie University.
The document summarizes a campus network design project submitted by Abani Sarkar and Rubayet Sazzad. The design proposes using gigabit Ethernet switching with a central switch and seven secondary switches connected via fiber backbone. It also recommends configuring two department-level servers for application and web services. The objectives of the design are to minimize expenses, ensure reliability and performance, enable manageability, and allow for scalability.
This document discusses public switched data networks (PSDN), value added networks, and the CCITT X.25 protocol for PSDN. It describes how PSDNs transport data through switching nodes and transmission links similarly to telephone networks. Value added networks provide additional services on leased communication lines. The document also outlines different PSDN switching techniques, the X.25 interface standard, packet format, and switching services like permanent virtual circuits and virtual calls.
Secure and efficient data transmission for cluster based wirelessSai Sirisha
This document proposes two secure data transmission protocols for cluster-based wireless sensor networks called SET-IBS and SET-IBOOS. SET-IBS relies on the Diffie-Hellman problem for security, while SET-IBOOS relies on the discrete logarithm problem. The protocols aim to securely and efficiently transmit sensor data to base stations while improving on existing protocols by reducing computational overhead and energy consumption through clustering and dynamic routing techniques. Evaluation of the protocols demonstrates their effectiveness compared to other secure clustering methods for wireless sensor networks.
This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
The document discusses the CCNA certification exam which tests knowledge of networking concepts. The exam is 90 minutes long with 45-55 multiple choice and simulation questions. Candidates must score 849 points or higher to pass. Obtaining the CCNA provides peer validation for personal and potential employer benefits, as well as opportunities for career advancement.
The document is a resume for Tasnimul Hasan Shaon, a senior network engineer. It summarizes his work experience including his current role as a senior engineer at Link3 Technologies Ltd where he manages core networks, troubleshoots issues, and maintains quality of service. Previously he worked as an assistant engineer at two other companies where he configured, monitored, and troubleshot core networks and internet connectivity. The resume lists his skills such as routing protocols, network monitoring tools, and working with various networking hardware and vendors. It also provides his educational background and qualifications including a bachelor's degree in electronics and telecommunication engineering.
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...MyNOG
1. Data centre interconnect (DCI) technology connects multiple data centres using high-speed connectivity to allow sharing of resources. DCI adoption is growing rapidly to support increased bandwidth consumption from cloud computing and distributed infrastructure.
2. X86 Network provides DCI solutions in Malaysia, Singapore, and globally to over 100 data centres. Their solutions include dedicated connectivity, internet exchange extensions, and disaster recovery capabilities.
3. X86's DCI offerings are supported by their 24/7 network operations centre and next business day activations. Their global network utilizes coherent and DWDM technology to provide highly reliable, high-capacity connectivity between customer data centres.
- Cloud computing allows users to access software and hardware resources that are managed by third parties and made available over the internet. Mobile cloud computing combines mobile devices and cloud computing, allowing computing tasks and data storage to occur remotely. Cloud radio access networks (C-RAN) centralize base stations and use cloud computing to improve coordination and reduce costs. The document proposes a mobile cloud computing system using C-RAN that employs a split-TCP proxy and centralized wireless network cloud to improve throughput and latency for mobile users. Simulation results demonstrate performance improvements over existing systems.
The document describes a proposed Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing. It aims to provide secure data sharing and efficient access control for resource-constrained mobile devices. The key aspects are:
1. It uses Attribute-Based Encryption (ABE) and outsources computationally intensive encryption/decryption tasks to proxy servers, reducing overhead on mobile devices.
2. The access structure is modified to be suitable for mobile cloud scenarios and lazy revocation is introduced to reduce revocation costs.
3. A prototype framework is implemented to evaluate LDSS, showing it can greatly reduce client-side overhead while introducing minimal additional costs on the server side.
This document evaluates the effectiveness of shallow and deep neural networks for intrusion detection. It describes applying feature sets from network connection records to shallow models like logistic regression and deep models like multilayer perceptrons and deep belief networks. The results show that deep networks performed better than shallow networks at detecting attacks in two intrusion detection datasets. However, the datasets are outdated and do not represent modern network traffic. Future work should evaluate the models on more recent intrusion detection data.
Benjamin Fang is seeking a senior network engineer position with opportunity to implement current technologies. He has a bachelor's and master's degree from Nanjing University in China and an MBA from Baylor University. He has over 20 years of experience in network engineering including positions at Frontier Communications, Cisco Systems, Capital One, and the Federal Reserve Bank. He has numerous professional certifications including CCIE Data Center and Routing and Switching.
The document discusses the CCNA certification, which is Cisco's entry-level networking certification and a prerequisite for other Cisco certifications. It covers topics like static and dynamic routing, router configuration modes, switching, campus area networks (CANs), and provides examples of CAN scenarios for different blocks at a campus including the engineering block, admin block, boys hostel block, and WAN block.
- IT is at an inflection point due to pressures from both internal and external factors such as legacy architectures, outdated applications, rigid processes, and high operating costs. 70% of CXOs expect their IT department to undergo significant changes in the next three years.
- The future of IT service delivery is a brokerage model enabled by cloud computing. In this model, the CIO becomes a Chief Innovation Officer and cloud computing allows for the transformation of IT departments.
- For higher education institutions, adopting a cloud brokerage model allows the IT department to help transform the institution's business while also transforming itself. This helps meet the expectations of students and the broader campus community for more flexible, on-demand, and cost
The document is a resume for James C. Craven. It summarizes his experience as a senior network engineer leading a team supporting the network infrastructure for the Space and Naval Warfare Systems Command (SPAWAR) sites on the east coast of the US and in Germany. It details his extensive experience designing, implementing, and managing complex wired and wireless network infrastructure including routing, switching, firewalls, wireless, and optical networking. It also lists his relevant work history, education, training, and certifications.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
More Related Content
Similar to Nebula - The Future Internet Architecture
Department of Computer Application- Advanced computer network
Locations
Resource-Sharing Functions and Benefits
Resource sharing
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Cryptographic Building Blocks
Keynote @ Keynote @ II International event on Research in Computing Systems. IT Mexicali. Mexico This slide set presents the Ephemeral Wireless Networks research domain developed in Trinity College Dublin, by Johann Marquez-Barja et al.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
This document discusses the deployment of a next generation telecom transport network. The objectives are to form a network to offer both IPv6 and IPv4 services, successfully deploy an IPv6 network, and configure firewall security. It covers literature on IPv6 migration, routing protocols like OSPF, hardware configurations including routers, switches, and firewalls. It also compares IPv4 and IPv6, and discusses security techniques like DMZ. The references cited papers on IPv6 necessity, distributed firewall systems, IPv6 research and applications, and data security protocols.
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
The document discusses big data analytics and advanced computer networking scenarios, including research challenges and opportunities. It covers technical background on measurements and analysis in computer networks. It also discusses new networking architectures like Software-Defined Networking (SDN), Information-Centric Networking (ICN), and network visualization. Tools and techniques for high-performance network traffic analysis using visual analytics are also covered. The document provides an agenda for applied research opportunities in computer networking between CIn/UFPE and Dalhousie University.
The document summarizes a campus network design project submitted by Abani Sarkar and Rubayet Sazzad. The design proposes using gigabit Ethernet switching with a central switch and seven secondary switches connected via fiber backbone. It also recommends configuring two department-level servers for application and web services. The objectives of the design are to minimize expenses, ensure reliability and performance, enable manageability, and allow for scalability.
This document discusses public switched data networks (PSDN), value added networks, and the CCITT X.25 protocol for PSDN. It describes how PSDNs transport data through switching nodes and transmission links similarly to telephone networks. Value added networks provide additional services on leased communication lines. The document also outlines different PSDN switching techniques, the X.25 interface standard, packet format, and switching services like permanent virtual circuits and virtual calls.
Secure and efficient data transmission for cluster based wirelessSai Sirisha
This document proposes two secure data transmission protocols for cluster-based wireless sensor networks called SET-IBS and SET-IBOOS. SET-IBS relies on the Diffie-Hellman problem for security, while SET-IBOOS relies on the discrete logarithm problem. The protocols aim to securely and efficiently transmit sensor data to base stations while improving on existing protocols by reducing computational overhead and energy consumption through clustering and dynamic routing techniques. Evaluation of the protocols demonstrates their effectiveness compared to other secure clustering methods for wireless sensor networks.
This document discusses basic concepts of wireless networking and wireless LAN configuration. It begins by explaining how wireless networking allows for mobile productivity as users can access the network from any location. It then discusses why wireless networking is used, including flexibility and reduced costs compared to wired networks. Finally, it covers wireless LAN components like wireless access points that connect wireless clients to the wired LAN, and wireless network interface cards that allow devices to connect to the network wirelessly.
The document discusses the CCNA certification exam which tests knowledge of networking concepts. The exam is 90 minutes long with 45-55 multiple choice and simulation questions. Candidates must score 849 points or higher to pass. Obtaining the CCNA provides peer validation for personal and potential employer benefits, as well as opportunities for career advancement.
The document is a resume for Tasnimul Hasan Shaon, a senior network engineer. It summarizes his work experience including his current role as a senior engineer at Link3 Technologies Ltd where he manages core networks, troubleshoots issues, and maintains quality of service. Previously he worked as an assistant engineer at two other companies where he configured, monitored, and troubleshot core networks and internet connectivity. The resume lists his skills such as routing protocols, network monitoring tools, and working with various networking hardware and vendors. It also provides his educational background and qualifications including a bachelor's degree in electronics and telecommunication engineering.
Data Centre Interconnect (DCI) with X86’s DCI Solution by Raja Akmal, X86 Net...MyNOG
1. Data centre interconnect (DCI) technology connects multiple data centres using high-speed connectivity to allow sharing of resources. DCI adoption is growing rapidly to support increased bandwidth consumption from cloud computing and distributed infrastructure.
2. X86 Network provides DCI solutions in Malaysia, Singapore, and globally to over 100 data centres. Their solutions include dedicated connectivity, internet exchange extensions, and disaster recovery capabilities.
3. X86's DCI offerings are supported by their 24/7 network operations centre and next business day activations. Their global network utilizes coherent and DWDM technology to provide highly reliable, high-capacity connectivity between customer data centres.
- Cloud computing allows users to access software and hardware resources that are managed by third parties and made available over the internet. Mobile cloud computing combines mobile devices and cloud computing, allowing computing tasks and data storage to occur remotely. Cloud radio access networks (C-RAN) centralize base stations and use cloud computing to improve coordination and reduce costs. The document proposes a mobile cloud computing system using C-RAN that employs a split-TCP proxy and centralized wireless network cloud to improve throughput and latency for mobile users. Simulation results demonstrate performance improvements over existing systems.
The document describes a proposed Lightweight Data Sharing Scheme (LDSS) for mobile cloud computing. It aims to provide secure data sharing and efficient access control for resource-constrained mobile devices. The key aspects are:
1. It uses Attribute-Based Encryption (ABE) and outsources computationally intensive encryption/decryption tasks to proxy servers, reducing overhead on mobile devices.
2. The access structure is modified to be suitable for mobile cloud scenarios and lazy revocation is introduced to reduce revocation costs.
3. A prototype framework is implemented to evaluate LDSS, showing it can greatly reduce client-side overhead while introducing minimal additional costs on the server side.
This document evaluates the effectiveness of shallow and deep neural networks for intrusion detection. It describes applying feature sets from network connection records to shallow models like logistic regression and deep models like multilayer perceptrons and deep belief networks. The results show that deep networks performed better than shallow networks at detecting attacks in two intrusion detection datasets. However, the datasets are outdated and do not represent modern network traffic. Future work should evaluate the models on more recent intrusion detection data.
Benjamin Fang is seeking a senior network engineer position with opportunity to implement current technologies. He has a bachelor's and master's degree from Nanjing University in China and an MBA from Baylor University. He has over 20 years of experience in network engineering including positions at Frontier Communications, Cisco Systems, Capital One, and the Federal Reserve Bank. He has numerous professional certifications including CCIE Data Center and Routing and Switching.
The document discusses the CCNA certification, which is Cisco's entry-level networking certification and a prerequisite for other Cisco certifications. It covers topics like static and dynamic routing, router configuration modes, switching, campus area networks (CANs), and provides examples of CAN scenarios for different blocks at a campus including the engineering block, admin block, boys hostel block, and WAN block.
- IT is at an inflection point due to pressures from both internal and external factors such as legacy architectures, outdated applications, rigid processes, and high operating costs. 70% of CXOs expect their IT department to undergo significant changes in the next three years.
- The future of IT service delivery is a brokerage model enabled by cloud computing. In this model, the CIO becomes a Chief Innovation Officer and cloud computing allows for the transformation of IT departments.
- For higher education institutions, adopting a cloud brokerage model allows the IT department to help transform the institution's business while also transforming itself. This helps meet the expectations of students and the broader campus community for more flexible, on-demand, and cost
The document is a resume for James C. Craven. It summarizes his experience as a senior network engineer leading a team supporting the network infrastructure for the Space and Naval Warfare Systems Command (SPAWAR) sites on the east coast of the US and in Germany. It details his extensive experience designing, implementing, and managing complex wired and wireless network infrastructure including routing, switching, firewalls, wireless, and optical networking. It also lists his relevant work history, education, training, and certifications.
Similar to Nebula - The Future Internet Architecture (20)
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
2. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Overview
• Three basic foundations of Nebula.
• Sponsored and supported by National Science
Foundation and CISCO systems.
• Focussed on a future network enabling enabling the
vision of cloud computing.
3. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Motivation/Problem
• The bloom of Cloud Computing.
• Security of network.
• Broad applicability.
4. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Motivation / Problem
“”We need a new network architecture !!!””
• Availability and Dependability.
• Cloud Computing have embraced weak consistency.
• Redefined security.
• Smarter network. (Flexible and Extensible)
5. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Example ( Critical Application)
Monitor current glucose level
Monitor what was being eaten
Monitor exercise activity
Insulin infusion recommendation
Machine Learning
6. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Enters “NEBULA”
• Nebula is an architecture for the cloud based future
Internet.
• Comprehensive, Clean slate and Reliable.
• Basic decisions include use of packet switching, multiple
paths & store-and-forward routers.
• Backbone of Data Centers.
7. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
Principles & Architecture
ARCHITECTURE
• Services provided by cloud data
centers.
• Multiple cloud providers, that use
replication
• Variety of access mechanisms.
• Transit networks to interconnect
data centers.
PRINCIPLES
• Ultra reliable interconnecting
data centers.
• Parallel paths between data
centers and core routers.
• Secure and authentic connection
establishment.
• Policy based path selection.
8. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA – Building blocks
NEBULA
NCORE NDP NVENT
• Nebula Core Architecture.
• Nebula Data Plane.
• Nebula Virtual and Extensible Networking Techniques.
10. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NCORE)
• High Performance Core Routers.
• Highly Reliable.
• Programmable.
• Load balancing.
• Supports features like Network Provence, failure detection
and path diversity.
• Problems can be diagnosed and repaired during runtime.
ROUTERS
FIRE
11. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA(NCORE)
ROUTERS
Redundant paths.
13. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NDP)
• Primarily focussed on Distributed multiple path
establishment and policy enforcement.
• Policies may include security, privacy and fault tolerance
requests.
• Uses path verification mechanism known as ICING.
• Proof of Consent & Proof of Provenance.
• It must check whether the path is authorized.
• It must also check whether the authorized path was
followed.
DATA PLANE
14. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NDP)
Data Plane
other
fields
payload...
hop 1
info
hop n
info
hop
#counter
Proof of
Consent
Proof of
Path
Domain ID
MPLS-style
token
42n bytes6 bytes 1 byte 6 bytes
42 bytes
• POC is basically a Cryptographic token.
• As packet traverses the path, it is incrementally marked with POP.
• Enforces network provenance by using POP.
• Denial of service attacks are much difficult to carry out. (Secure)
15. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
• Nebula Virtual and Extensible Networking Technology.
• NVENT embodies new control-plane technologies that
focus on policy specification, policy-based path setup and
service naming.
• NVENT uses declarative networking.
CONTROL PLANE
16. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
CONTROL PLANE
17. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
• Declarative Networking is a programming methodology
that enables developers to concisely
specify network protocols and services, which are directly
compiled to a dataflow framework that executes the
specifications.
• Just as BGP in the current Internet, NVENT provides a set
of default paths to ensure global reachability, but it also
provides an interface to NDP, which is available to users for
requesting custom paths, e.g., for applications that require
high reliability
CONTROL PLANE
18. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA (NVENT)
CONTROL PLANE
NVENT
NDP
policy
engine
policy
engine
policy
engine
policy
engine
consent
engine
consent
engine
consent
engine
consent
engine
d
a
t
ad
a
t
a
1
2
2
3
4
5
path
req
path
spec
10
d
a
t
a
d
a
t
a
d
a
t
a
8 96 7
SLA
1
SLA
2 gst
employees
lan
19. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
20. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
• Cell phone contacts NVENT & requests a path to NCORE.
• NVENT looks for path compiling to the policy and contacts
NDP policy server to obtain necessary POC’s.
• NVENT returns all the POC’s to the cell phone.
• Cell phone uses these POC’s to send packets via NDP to
nearest NCORE router.
• NCORE performs network provenance to verify the path and
forwards packets to Data Center.
21. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PUTTING NEBULA TOGETHER
• Nebula’s security can be related to the
immigration process.
• Detailed security with high efficiency.
• POP’s usually happen at boundaries.
• Policy Server may have 0 or more
policies.
• If Policies = 0, then DEFAULT DENY.
• Policies are cacheable.
• Policies can be queried by clients.
• Example: NEBULAPATH = HIPAA.
22. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
PROTOTYPE - ZODIAC
23. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
RESEARCH QUESTIONS ?
• ICING vs. TorIP vs. TaaS.
• Application interface to specify policy.
• Relationship between Policy enforcing plane and NCORE
routers still in flux.
• Organization contracts ?
• Name service implementation ?
24. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA CONFIGURATION & OPERATION
• Policy Configuration – API level work in NVENT to
determine client requirements.
• Path Setup – Policy request.
• Forwarding - POC’s & POP’s.
• Naming – TorIP (ISP, ID) “ID indentifies a mailbox”
ICING (DNS augmented by policy enforcement)
www. foo . comEXAMPLE(ICING):
POC1 POC2
Remember POC’s
are cacheable
25. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
NEBULA ARCHITECTURAL CHOICES
Design Goal NEBULA
Communication must continue despite loss
of networks, links, or gateways.
NEBULA uses multiple dynamically allocated
paths and reliable transport.
Allow host attachment and operation with
a low level of effort
NVENT/NDP is as easy to automate and use
as DHCP/IP.
Support secure communication
(authentication, authorization, integrity,
confidentiality) among trusted nodes.
Mutually suspicious NDP nodes self-select
paths exhibiting cryptographic proofs of
properties required for security.
Provide a cost-effective communications
infrastructure
NCORE places resources where
architecturally needed; policy analysis.
Implement network and user policies Policies implemented with NDP and NVENT.
The architecture must accommodate a
variety of networks.
NDP sends packets by encapsulation, NVENT
networks by virtualization
The architecture must permit distributed
management of its resources.
NDP path establishment decentralized,
NVENT
27. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
HOW NEBULA WILL REDEFINE INTERNET ?
• From best effort to delivery assurance.
• Dynamic routers.
• Evolution in network rather than at end points.
• Revolutionising cloud infrastructure.
28. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
EVALUATION
• The design choices for NDP was strongly focused on the
following parameters:
1. Assured Paths.
2. Controlled Access.
3. Availability.
4. Autonomous control of resources.
5. Privacy enhanced communication.
“NDP provides a superset of the union of the features
provided by other projects.” Eg : BGP, Byzantine routing.
Average header = 250 bytes
Average packet = 1300 bytes
20 % more space
29. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Nebula is a future internet architecture that is intrinsically more
secure and addresses threats to the emerging computer utility
capabilities (cloud computing) while meeting the challenges of
flexibility, extensibility and economic viability.
• Architecture divided into NDP, NCORE and NVENT.
• Interconnecting data centers is the primary focus.
• Highly secure, realiable & efficient.
• Can be used in areas such as Biotelemetry & Defence.
SUMMARY
30. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer,
Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives,
Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazières, Antonio
Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael
Walfish, Hakim Weatherspoon, and Christopher S. Yoo. The NEBULA Future
Internet Architecture, volume 7858 of LNCS. Springer Verlag, 2013.
• NEBULA project web page - http://nebula-fia.org/.
• Douglas Comer. A future Internet architecture that supports Cloud
Computing. In Proc. 6th International Conference on Future Internet
Technologies (CFI), June 2011.
• Andrei Agapi, Ken Birman, Robert M. Broberg, Chase Cotton, Thilo Kielmann,
Martin Millnert, Rick Payne, Robert Surton, and Robbert van Renesse. Routers
for the Cloud: Can the Internet achieve 5-nines availability? IEEE Internet
Computing, 15(5):72–77, 2011.
ACKNOWLEDGEMENTS
31. Trinity College Dublin, The University of Dublin
CS7002 Data Communications
• Birman, K.P., Huang, Q., Freedman, D.: Overcoming the “D” in CAP: Using
Isis2 to build locally responsive cloud services. IEEE Internet Computing 12,
50–58 (2012)Aditya, P., Zhao, M., Lin, Y., Haeberlen, A., Druschel, P., Maggs,
B., Wishon, B.Reliable client accounting for hybrid contentdistribution
networks. In: Proc. NSDI(April 2012)
• Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau
Loo, and Micah Sherr. 23rd ACM Symposium on Operating Systems Principles
(SOSP '11), Cascais, Portugal, Oct 2011. DOI 10.1145/2043556.2043584.
• Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument
systemsfor outsourced computation practical (sometimes). In: Proc. NDSS
(February 2012)
• Zhou,W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure
network provenance. In: Proc. SOSP (October 2011)
ACKNOWLEDGEMENTS