Current network devices enable connectivity between end systems given a set of protocol software bundled with vendor hardware. It is impossible for customers to add software functionality running locally on top of network devices to augment vendor software. Our vision is to open network devices so that customized software can be downloaded, allowing for more flexibility and with a focus on industry and customer specific solutions. This brings considerable value to the customer. We have chosen to use Java because we can reuse its security mechanism and
dynamically download software. We can isolate the Java VM and downloaded Java programs from the core router functionality. We implemented Java Virtual Machines (JVMs) on a family of network devices,
implemented an Open Services framework, and developed an SNMP MIB API and a Network API upon which we can demonstate the value of openness and programmability of network devices.
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are in exible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that a host gets compromised. We present an architecture that addresses these issues by using a programmable router to provide dynamic
ne-grained network access control. The Javaenabled router dynamically generates and enforces
access control rules using policies and user proles as input, reducing administrative overhead. Our modular design integrates well with existing authentication and directory servers, further reducing admininstrative costs. Our prototype is implemented using Nortel's Accelar router and moves users to VLANs with the appropriate access privilege.
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
Security of Software Defined Networking (SDN)
Overview
Definition Software Defined Networking (SDN)
SDN security & Security Challenges
SDN Attack Surface & Attacks Examples
SDN Threat Model
Open Research issues SDN
Future Research Directions
Simulator for Software Defined Networking
Security of Cognitive Radio Network (CRN)
Overview
Definition Cognitive Network
Security of Cognitive Radios & Threats
Security issues in cognitive radio
Attacks and the proposed defense mechanisms
Open Research issues in Cognitive Radio
Evaluation Methodologies for Cognitive Networking
Future Research Directions
Simulator for Cognitive Radio
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are in exible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same
Intranet, in order to contain damages in the case that a host gets compromised. We present an architecture that addresses these issues by using a programmable router to provide dynamic
ne-grained network access control. The Javaenabled router dynamically generates and enforces
access control rules using policies and user proles as input, reducing administrative overhead. Our modular design integrates well with existing authentication and directory servers, further reducing admininstrative costs. Our prototype is implemented using Nortel's Accelar router and moves users to VLANs with the appropriate access privilege.
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
Security of Software Defined Networking (SDN)
Overview
Definition Software Defined Networking (SDN)
SDN security & Security Challenges
SDN Attack Surface & Attacks Examples
SDN Threat Model
Open Research issues SDN
Future Research Directions
Simulator for Software Defined Networking
Security of Cognitive Radio Network (CRN)
Overview
Definition Cognitive Network
Security of Cognitive Radios & Threats
Security issues in cognitive radio
Attacks and the proposed defense mechanisms
Open Research issues in Cognitive Radio
Evaluation Methodologies for Cognitive Networking
Future Research Directions
Simulator for Cognitive Radio
Connected World in android - Local data sharing and service discoveryTalentica Software
With the boom of IOT, BLE (Bluetooth low energy) and other connected devices and protocols, android app development is no longer limited to basic client server interaction. Android app development now includes interaction with other devices (not necessarily android) in the vicinity, at its very core.
Transferring files with friends without internet, Bluetooth and WiFi; streaming media from your phone or tablet to dumb plain TV (without HDMI cables) and switching off bedroom light with phone have become part of our lives. Let's explore how it's done and where do we need to start to kick start such projects.
In this session we will explore:
• Communication between connected and non-connected android devices.
• BLE overview (Bluetooth Low Energy).
• BLE APIs you should know about.
• WiFi-Direct and P2P.
• WiFi-Direct service discovery.
• Network service discovery (NSD) and relevant demos
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. We’ve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, we’ve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features – and release schedules – of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from “software automating software.” This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. We’ll take a look at the basics of SDN and some of its key elements – OpenFlow, network virtualization, and orchestration – along with some of the initiatives and companies that are setting the stage for the next generation of networking.
Test 3G network performance, security, and stability at massive scale, quickly and cost-effectively against the behavior of millions of mobile users streaming video, calling, texting, spreading malware, and more.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
Connected World in android - Local data sharing and service discoveryTalentica Software
With the boom of IOT, BLE (Bluetooth low energy) and other connected devices and protocols, android app development is no longer limited to basic client server interaction. Android app development now includes interaction with other devices (not necessarily android) in the vicinity, at its very core.
Transferring files with friends without internet, Bluetooth and WiFi; streaming media from your phone or tablet to dumb plain TV (without HDMI cables) and switching off bedroom light with phone have become part of our lives. Let's explore how it's done and where do we need to start to kick start such projects.
In this session we will explore:
• Communication between connected and non-connected android devices.
• BLE overview (Bluetooth Low Energy).
• BLE APIs you should know about.
• WiFi-Direct and P2P.
• WiFi-Direct service discovery.
• Network service discovery (NSD) and relevant demos
Software Defined Networking (SDN) Technology BriefZivaro Inc
An overview of Software-Defined Networking (SDN) and the key benefits of moving to a virtualized network, including:
- Improved time to market through automation
- Optimal trafficking with a global view of the network
- Quicker enablement of new services
- Reduced operating costs
- Improved management and visibility
- Simplified operation of network devices
From "Introduction to Software Defined Networking" webinar presented by GTRI CTO Scott Hogg on March 10, 2016. Webinar recording: https://youtu.be/gRXnctYDBjE
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. We’ve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, we’ve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features – and release schedules – of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from “software automating software.” This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. We’ll take a look at the basics of SDN and some of its key elements – OpenFlow, network virtualization, and orchestration – along with some of the initiatives and companies that are setting the stage for the next generation of networking.
Test 3G network performance, security, and stability at massive scale, quickly and cost-effectively against the behavior of millions of mobile users streaming video, calling, texting, spreading malware, and more.
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...Sagar Rai
Software, Software Defined Network, Network Function Virtualization, SDN, NFV, Internet of things, Basics of Internet of things, Network Basics, Virtualization, Limitation of Conventional Network, Open flow, Basics of conventional network,
The project Remote Web Desk deals with remote control of computer over some form of network usually a LAN or the Internet. It allows friend or an administrator to fix problem on your computer or you can use it to show your desk top to somebody at a remote location
The PacketStorm IP Network Emulators and simulators reproduce the unfavorable conditions of IP Networks and WANs in a controllable and repeatable lab setting. PacketStorm is the Industry leader of Layer 2 and Layer 3 WAN emulation and network bandwidth simulation.
This paper describes the concept of implementing the network vulnerability assessment process as a web service in Eucalyptus cloud.This paper is published in one of the international conferences.I implemented the mentioned concept during my M.E. thesis.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Embodiments of the present invention present a method and apparatus for photonic line sharing for high-speed routers. Photonic switches receive high-speed optical data streams and produce the data streams to a router operating according to routing logic and produce optical data streams according to destination addresses stored in the data packets. Each photonic switch can be configured as one of a 1:N multiplexer or an M:N cross-connect switch. In one embodiment, optical data is converted to electrical data prior to routing, while an alternate embodiment routes only optical data. Another embodiment transfers large volumes of high-speed data through an optical bypass line in a circuit switched network to bypass the switch fabric thereby routing the data packets directly to the destination. An edge device selects one of the packet switched network or the circuit switched network. The bypass resources are released when the large volume of high-speed data is transferred.
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
Embodiments of the invention provide for providing support for sharing and exchanging in a network. The system includes a memory coupled to a processor. The memory includes a database comprising information corresponding to first users and the second users. Each of the first users and the second users are facilitated for sharing or exchanging activity, service or product, based on one or more conditions corresponding thereto. Further, the memory includes one or more instructions executable by the processor to match each of the first users to at least one of the second users. Furthermore, the instructions may inform each of the first users about the match with the at least one of the second users when all the conditions are met by the at least one second user based on the information corresponding to each of the second users.
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Systems and methods for electronic communicationsTal Lavian Ph.D.
Embodiments of the invention provide a system for enhancing user interaction with the Internet of Things. The system includes a processor, and a memory coupled to the processor. The memory includes a database having one or more options corresponding to each of the Internet of Things. The memory further includes instructions executable by the processor to share at least one of the one or more options with one or more users of the things. Further, the instructions receive information corresponding to selection of the at least one option by the one or more users. Additionally, the instructions update the database based on the selection of the at least one option by the one or more users. Further, a device for enhancing interaction with the things is also disclosed.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
An object detection system for autonomous vehicle, comprising a radar unit and at least one ultra-low phase noise frequency synthesizer, is provided. The radar unit configured for detecting the presence and characteristics of one or more objects in various directions. The radar unit may include a transmitter for transmitting at least one radio signal; and a receiver for receiving the at least one radio signal returned from the one or more objects. The ultra-low phase noise frequency synthesizer may utilize Clocking device, Sampling Reference PLL, at least one fixed frequency divider, DDS and main PLL to reduce phase noise from the returned radio signal. This proposed system overcomes deficiencies of current generation state of the art Radar Systems by providing much lower level of phase noise which would result in improved performance of the radar system in terms of target detection, characterization etc. Further, a method for autonomous vehicle is also disclosed.
Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
An apparatus and method for dynamic assignment of classes of traffic to a priority queue. Bandwidth consumption by one or more types of packet traffic received in the packet forwarding device is monitored to determine whether the bandwidth consumption exceeds a threshold. If the bandwidth consumption exceeds the threshold, assignment of at least one type of packet traffic of the one or more types of packet traffic is changed from a queue having a first priority to a queue having a second priority.
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
An XML accessible network device is capable of performing functions in response to an XML encoded request transmitted over a network. It includes a network data transfer service, coupled to a network, that is capable of receiving XML encoded requests from a client also connected to the network. A service engine is capable of understanding and parsing the XML encoded requests according to a corresponding DTD. The service engine further instantiates a service using parameters provided in the XML encoded request and launches the service for execution on the network device in accordance with a command design parameter. A set of device APIs interacts with hardware and software on the network device for executing the requested service on the network device. If necessary, a response is further collected from the device and provided to the client in a response message.
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Embodiments of the present invention provide a system for enhancing reliability in computation of ratings provided by a user over a social network. The system comprises of a processor and a memory coupled to the processor. The memory further comprises a rater score database, a satisfaction database, a social network registration database, a user profile database, and a plurality of instruction executable by the processor. Said instructions in the memory are enabled to accept a message from at least one user wherein said message comprises a satisfaction score associated with at least one service provider and to retrieve a rater score associated with said at least one user from said rater score database. Further, the memory includes instructions in order to compute a new satisfaction score based on said rater score and said satisfaction score and update said satisfaction database to include said new satisfaction score. In a similar manner, the new satisfaction score can be computed based upon the information stored in the social network registration database and user profile database.
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
Embodiments of the invention provide a system for generating an Interactive Voice Response (IVR) database, the system comprising a processor and a memory coupled to the processor. The memory comprising a list of telephone numbers associated with one or more destinations implementing IVR menus, wherein the one or more destinations are grouped based on a plurality of categories of the IVR menus. Further the memory includes instructions executable by said processor for automatically communicating with the one of more destinations, and receiving at least one customization record from said at least one destination to store in the IVR database.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
A system for providing ultra low phase noise frequency synthesizers using Fractional-N PLL (Phase Lock Loop), Sampling Reference PLL and DDS (Direct Digital Synthesizer). Modern day advanced communication systems comprise frequency synthesizers that provide a frequency output signal to other parts of the transmitter and receiver so as to enable the system to operate at the set frequency band. The performance of the frequency synthesizer determines the performance of the communication link. Current days advanced communication systems comprises single loop Frequency synthesizers which are not completely able to provide lower phase deviations for errors (For 256 QAM the practical phase deviation for no errors is 0.4-0.5°) which would enable users to receive high data rate. This proposed system overcomes deficiencies of current generation state of the art communication systems by providing much lower level of phase deviation error which would result in much higher modulation schemes and high data rate.
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...PinkySharma900491
Class khatm kaam kaam karne kk kabhi uske kk innings evening karni nnod ennu Tak add djdhejs a Nissan s isme sniff kaam GCC bagg GB g ghan HD smart karmathtaa Niven ken many bhej kaam karne Nissan kaam kaam Karo kaam lal mam cell pal xoxo
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...Amil baba
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
Open Programmable Architecture for Java-enabled Network Devices
1. Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 1
Open Programmable Architecture
for Java-enabled Network Devices
Tal Lavian, Nortel Networks - Advanced Technology Center
Robert F. Jaeger, University of Maryland
Jeffrey K. Hollingsworth, University of Maryland
Keywords: Open Architecture, Programmable Networks, Java-enabled Networking,
JVM, Active Networks, Mobile Agents, Intelligent Agents.
1 Overview
Current network devices enable connectivity between end systems given a set of protocol
software bundled with vendor hardware. It is impossible for customers to add software
functionality running locally on top of network devices to augment vendor software. Our
vision is to open network devices so that customized software can be downloaded,
allowing for more flexibility and with a focus on industry and customer specific
solutions. This brings considerable value to the customer.
We have chosen to use Java because we can reuse its security mechanism and
dynamically download software. We can isolate the Java VM and downloaded Java
programs from the core router functionality.
We implemented Java Virtual Machines (JVMs) on a family of network devices,
implemented an Open Services framework, and developed an SNMP MIB API and a
Network API upon which we can demonstate the value of openness and programmability
of network devices.
2 Open Network Services
2.1 New Programmable Paradigm
We are entering a new era where servers, switches, and routers are participating in
applications. The IEEE P1520 recognized the need for a software infrastructure for
programming networks and has initiatives which propose standard APIs to networking
devices. [28-29].
Programmable network technology allows dynamic downloading of software programs to
network devices and moving intelligence to these devices. Downloading software
enables customized application level computational interconnectivity between servers
and network devices as well as among network devices. Programmable networks is an
enabling technology for a new type of distributed applications that are not technically
possible today.
2. Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 2
2.2 PC-ifications of Programmable Devices
In network devices like switches and routers, the software and the hardware are bundled
and not openly programmable. We have created an Open Service Architecture that allows
dynamic downloading of programs to theses devices.
Our vision is that network devices will be open like software for PCs. For example, we
buy software and hardware for PCs from different vendors, and then we install and
customize the software on the computer. Network devices like switches and routers are
also computers of a different type. We have implemented programmability
characteristics on these types of computers like the PCs so that additional functionality
can be provided to these devices.
2.3 Enabling Technology
Now, we are able to securely download and run Java applications on network devices.
We can distribute the intelligence to network devices for close-loop interaction on the
nodes. This allows for new types of applications that were not possible until now because
of scalability issues.
We have implemented technology that allows for a class of downloadable applications
which are not bundled with the vendor hardware including enhanced multicast services,
application level filtering, and mobile/intelligent agents [4] [13] [17]. The platform
supports the Active Networking reference architecture upon which multiple non-
interfering Execution Environments can run concurrently [2-7] [9] [12] [14-18] [25].
Operating systems for computers have recently been developed to allow user
customization of services and policies. Exokernel[1]] and Spin[8] provide new kernel
architectures to support safety and extensibility.
2.4 Static Agent vs. Dynamic Agents
Usually, we are managing network devices via “get” and “set”, as static requests to
SNMP agents. Having a dynamic agent on the device opens us to a new set of
applications. Instead of external SNMP requests, we can download software that use
SNMP calls via an internal device loop.
The direction is to open network devices to 3rd
party developers. To facilitate this, we
have created an Open Service Interface[26] using Java with additional security
mechanisms. The interface opens the network devices to 3rd
party vendors and allow
other domain experts to add value to network devices.
Java has taken the computer world by storm. However, it is mainly used by client s and
servers for browser and business applications. Until now, Java did not run on the network
devices.
3. Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 3
2.5 New type of Applications
We can add value to network infrastructure by allowing tight code interaction between
business applications and network devices. This new paradigm allows a new type of
distributed applications between servers and swiches/routers. All software in the
applications can be dynamically loaded on to the servers and network devices.
2.6 Domain Experts
Domain experts that work closely with customers know the problems the customer faces
and may bring ideas from other business domains to the development of solutions.
Allowing 3rd
party experts to write custom applications allows for innovative solutions to
customer business requirements.
2.7 Feature-on-demand
Java beans with specific plug-in features can be developed and released quickly
providing feature-on-demand capability to address changing customer needs. This
approach circumvents the need for vendor support to add customer desired capabilities to
network devices and avoids the need for the customer to wait for new features from the
vendor in order to realize capabilities. Also, features can be ported quickly to other
products implementing the Open Service Interface.
3 Open Architecture
3.1 What have we implemented?
We have implemented JVMs on the Nortel Networks Routing and L3 Routing Switch
family of products. We can securely download and safely run Java applications on these
devices and access native code running on these devices [1]. We developed an
architecture that allows for downloading of new code to implement desired features. We
developed several APIs including an SNMP API and a Network API. The SNMP API
allows reading and writing of MIB variables [27]. The Network API allows Java
applications to control the hardware based forwarding and selection of packets to be
delivered to Java applications based on packet signatures. Consequently, our network
devices are programmable allowing for customers to safely run dynamically downloaded
Java code to realize additional functionality.
3.2 Scalability
Network Management via SNMP suffers scalability in applications with massive close-
loop interactions. For example, assume an NMS application that monitors some network
device parameters. Lets assume that we want to gather information on 10 parameters per
port on a device with 100 ports and we want to sample 100 times per second. These
types of applications are not practical in the current SNMP model of centralized
management.
Current technology like RMON provides an interface to allow network devices to collect
statistics locally. It is restricted to a set of predefined types of data that can be collected
and it does not address the scalability problem.
4. Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 4
We overcome these limitations in our distributed intelligence approach. The data
samples are local calls with no need for SNMP call for each sample. The NMS will be
notified only when needed based on thresholds or trends. This allows an intelligent event
notification mechanism rather than a polling mechanism.
3.3 Security
Computer networks have become vital to businesses. It is critical that the network
functions properly and a loss of operation is not tolerable. To allow the openness that we
are proposing, we needed to implement a strong security architecture. Security is a key
component of the Open Service Interface architecture. It includes security for
downloadable applications and for the device’s code interface. In addition to the Java
language security features, the architecture provides additional security including digital
signatures and code certification.
3.4 The JVM
Implementing a JVM for embedded and real-time environments presents several
challenges. Such environments are especially concerned with reliability, determinism,
and restricted memory. It is also crucially important that new Java programs must work
without disturbing the existing non-Java functionality.
Our JVM design satisfies these requirements by encapsulating the JVM into one
framework. This JVM manages the Java threads and their memory usage within this
framework and presents one unified task to the RTOS. The Open Services Architecture
was designed to insulate core router functionality from Java and JVM failures. Even if
the JVM crashes, the router remains operational.
3.5 But Java is SLOW
Java has often been criticized for its speed and its use in a routing device has been
questioned. With the advent of ASIC technology for fast path data forwarding engines
that achieve Gigabit forwarding rates, no serious routing platform is based on a software
forwarding engine. An active network platform that touches all network packets is
doomed to fail. However, control and management applications are well suited for Java
based network services locally on the network device as well as active applications which
don't require high packet per second rates to operate.
3.6 Java MIB API
The goal is to provide an interface that transparently gives access to the SNMP data,
while hiding the SNMP machinery of PDUs, object identifiers and table iterations. The
MIB gives a fairly object-oriented model to the data, which fits quite naturally onto Java
class decomposition.
The MIB is structured as a collection of groups, with each group containing a number of
variables. Each group is modeled as a Java class, and each variable is modeled with
accessory methods.
5. Tal Lavian August , 1999_ Hot Interconnects, Stanford
1 Open Programmable Architecture for Java-enabled Network Devices Page 5
3.7 Inter-operating with SNMP MIB Compiler
There are a large number of variables in the MIB and it is tedious and error prone to
generate the Java bindings for them all by hand. To automate the binding, we provide a
MIB compiler that takes the standard ASN.1 textual representation of the MIB and
generates the necessary Java code. This approach is similar to other mibgen tools and
results in a Java API which represents the MIB tree. Javadoc pages document the Java
MIB API that results from the input MIB definition.
An incremental strategy for MIB variable access is the result of this research. MIB
variables are queried and set by constructing SNMP PDUs that are sent to the loopback
interface of the device and delivered to the underlying SNMP stack. This approach
allows us to evolve from the loopback strategy by incrementally adding direct low-level
implementations of selected time-critical methods.
4 Applications Examples
4.1 Close-loop Applications
Creating a closed-loop mechanism on the device itself allows for the development of
tight local management applications. We can develop applications utilizing tight
interactions with the traffic pattern and the device capabilities. We can move some of the
intelligence of NMS and policy servers to the network devices. This allows for new types
of applications that are not feasible with centralized management schemes.
4.2 Example 1: Interactions with Business Applications
Currently, business applications are running on servers and networking applications are
running separately on network devices. There is very limited interconnection at the
application level. Downloading and running Java applications on network devices
enables collaborations between network devices and applications running on other
servers. Business applications can take advantage of distributed computing in an
environment consisting of applications running on network devices which leverage the
local-loop directly on the device. For instance, an electronic auctioning service can use
routers to filter bids which are no longer acceptable given that the bid price has already
been surpassed [10]. Another application can dynamically configure the output priority
queues on the network device as part of the application needs.
4.3 Example 2: Interactions with other network devices
Currently, network devices interact using a pre-defined set of protocols bundled with the
hardware. There are no interactions or sharing variables that is not within the confines of
bundled vendor software. In the Open Service Interface architecture, network devices
can run non-bundled distributed applications that interact at the application layer with
applications running on other devices. For example, a community of routers can make a
dynamic configuration decision based on bottlenecks or load. The decision making
process can be done as part of a distributed application within this community.