Towards a Cognitive TCPIP Network Architecture[taliem.ir]

Towards a Cognitive TCP/IP Network Architecture

The principal aim of cognitive networking is to equip traditional networks with some sort of intelligence, in order to make them evolve and achieve higher levels of performance than those that can currently be achieved . Typical characteristics of cognitive networks are the ability to monitor the environment they are deployed in, to take reasoned actions based on current conditions towards an end-to-end objective, and to learn from past experience. Such enhanced networks will likely be characterized by a nonnegligible complexity, which can be tolerated if accompanied by relevant benefits, such as performance increase or mitigation of management burden. Different cognitive proposals have been proposed thus far in the literature, ranging from general framework definitions , to cognitive node architectures , to specific implementations . This contribution aims to illustrate the concepts we advanced in previous works , in which we described how the cognitive networking paradigm can fill the gap between service-oriented architectures and network, and extend them, by enabling reasoning with external information, i.e. information that is not locally available and is sensed elsewhere in the network. This enables the cognitive process to achieve a global vision of the network, which should facilitate the achievement of better end-to-end performance.
Networking[taliem.ir]

Networking

You can test the termination of a long 10Base2 network without having to hunt for the ends of the cable. Simply use an ohmmeter and test the resistance between the central conductor and the shield of any BNC T-connectors (after removing the cable from the network card to which it is attached). If the reading is about 25 ohms, the cable is properly terminated; if the reading is about 50 ohms, one of the terminators is loose or missing. If the cable appears to be properly terminated but network problems persist, remove one of the terminators and use the ohmmeter to test the connection to the T-connector that you exposed. If the result is less than 50 ohms, you probably have a short in the cable; if it is more than 56 ohms, there is probably a loose T-connector somewhere on the network.
Enhancing DNS Security using[taliem.ir]

Enhancing DNS Security using Dynamic Firewalling with Network Agents

In this paper we propose a solution to strengthen the security of Domain Name System (DNS) servers associated with one or more Top Level Domains (TLD). In this way we intend to be able to reduce the security risk when using major internet services, based on DNS. The proposed solution has been developed and tested at FCCN, the TLD manager for the .PT domain. Through the implementation of network sensors that monitor the network in real-time, we are capable to dynamically prevent, detect or limit the scope of attempted intrusions or other types of occurrences to the DNS service. The platform relies heavily on cross- correlation allowing data from a particular sensor to be shared with the others. Administration tasks such as setting up alarms or performing statistical analysis are made through a web-based interface.
YAMR Yet Another Multipath Routing Protocol[taliem.ir]

YAMR: Yet Another Multipath Routing Protocol

Multipath routing is a promising technique to increase the Internet’s reliability and to give users greater control over the service they receive. However, past proposals choose paths which are not guaranteed to have high diversity. In this paper, we propose yet another multipath routing scheme (YAMR) for the interdomain case. YAMR provably constructs a set of paths that is resilient to any one inter-domain link failure, thus achieving high reliability in a systematic way. Further, even though YAMR maintains more paths than BGP, it actually requires significantly less control traffic, thus alleviating instead of worsening one of the Internet’s scalability problems. This reduction in churn is achieved by a novel hiding technique that automatically localizes failures leaving the greater part of the Internet completely oblivious .
Effcient Resource Management for Cloud[taliem.ir]

Effcient Resource Management for Cloud Computing Environments

The notion of Cloud computing has not only reshaped the feld of distributed systems but also fundamentally changed how businesses utilize computing today. While Cloud computing provides many advanced features, it still has some shortcomings such as the relatively high operating cost for both public and private Clouds. The area of Green computing is also becoming increasingly important in a world with limited energy resources and an ever-rising demand for more computational power. In this paper a new framework is presented that provides efcient green enhancements within a scalable Cloud computing architecture. Using power-aware scheduling techniques, variable resource management, live migration, and a minimal virtual machine design, overall system efciency will be vastly improved in a data center based Cloud with minimal performance overhead.
Cluster-head Election using Fuzzy Logic for Wireless Sensor Networks[taliem.ir]

Cluster-head Election using Fuzzy Logic for Wireless Sensor Networks

Wireless Sensor Networks (WSNs) present a new generation of real-time embedded systems with limited computation, energy and memory resources that are being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. Appropriate cluster-head node election can drastically reduce the energy consumption and enhance the lifetime of the network. In this paper, a fuzzy logic approach to cluster-head election is proposed based on three descriptors - energy, concentration and centrality. Simulation shows that depending upon network configuration, a substantial increase in network lifetime can be accomplished as compared to probabilistically selecting the nodes as cluster-heads using only local information.
A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE[taliem.ir]

A SECURE DOMAIN NAME SYSTEM BASED ON INTRUSION TOLERANCE

DNS was not designed to be secure. The biggest security hole in DNS is the lack of support for data integrity authentication, source authentication, and authorization. In this paper, a secure DNS scheme based on intrusion tolerance is proposed. This secure DNS is intrusion-tolerant by using Byzantine intrusion tolerant technique and voting mechanism. The scheme provides high integrity, robustness, and availability of service in the presence of arbitrary failures including failures due to malicious attacks. The proposed scheme consists of 3f+1 tightly coupled replicas per name server and guarantees safety and liveness properties of the system assuming no more than f replicas are faulty. By adding authentification of client and using symmetric key cryptography, the system guarantees a secure communication mechanism by providing a way to detect whether DNS data has been corrupted during communication over the Internet .Experimental results show that the scheme can provide a much higher degree of security and reliability, as well or even better than an implementation of the DNS security extension.
Eye-blink detection system for human–computer interaction[taliem.ir]

Eye-blink detection system for human–computer interaction

A vision-based human–computer interface is presented in the paper. The interface detects voluntary eyeblinks and interprets them as control commands. The employed image processing methods include Haar-like features for automatic face detection, and template matching based eye tracking and eye-blink detection. Interface performance was tested by 49 users (of which 12 were with physical disabilities). Test results indicate interface usefulness in offering an alternative mean of communication with computers. The users entered English and Polish text (with average time of less than 12s per character) and were able to browse the Internet. The interface is based on a notebook equipped with a typical web camera and requires no extra light sources. The interface application is available on-line as open-source software .
sat-base-algorithm-for-finding-Attractos[taliem.ir]

A SAT-Based Algorithm for Finding Attractors in Synchronous Boolean Networks

This paper addresses the problem of finding attractors in synchronous Boolean networks. The existing Boolean decision diagram-based algorithms have limited capacity due to the excessive memory requirements of decision diagrams. The simulation-based algorithms can be applied to larger networks, however, they are incomplete. We present an algorithm, which uses a SAT-based bounded model checking to find all attractors in a Boolean network. The efficiency of the presented algorithm is evaluated by analyzing seven networks models of real biological processes, as well as 150,000 randomly generated Boolean networks of sizes between 100 and 7,000. The results show that our approach has a potential to handle an order of magnitude larger models than currently possible.
The Logic Programming Paradigm and Prolog[taliem.ir]

The Logic Programming Paradigm and Prolog

The Prolog programs presented so far are declarative since they admit a dual reading as a formula. The treatment of arithmetic in Prolog compromises to some extent itsdeclarative underpinnings. However, it is difficult to come up with a better solution than the one offered by the original designers of the language. The shortcomings of Prolog’s treatment of arithmetic are overcome in the constraint logic programming languages.