摘要:
A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.
摘要:
A fiber network is monitored in order to detect physical intrusion. The state of polarization of an optical fiber is monitored. A fiber tap is determined to have occurred if the state of polarization of the fiber changes beyond a predetermined amount found to be associated with all types of fiber taps. Alternately, it may be determined that a fiber tap has occurred if the state of polarization changes beyond a second predetermined amount and in a predetermined direction. Monitoring of the state of polarization occurs before and after a time period chosen to be less than a time during which the state of polarization of the optical fiber is expected to drift. This step eliminates false positives due to natural fiber PMD drift.
摘要:
A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.
摘要:
A method and architecture of the present invention uses market-driven resource selection and mission deployment techniques to increase mission performance by optimizing network resource utilization. A mission controller forwards a service tender to a plurality of coupled network service entities to inquire about the costs associated with one or more services in the service set of the mission. Each network service entity may return a bid to the mission controller including a projected cost for the performance of the one or more services by the associated network service entity. The mission controller evaluates the bids received from the network service entities to select a network service entity for mission execution. Network resources selection is thus optimized using real-time network service entity cost information, thereby increasing the chance for mission success. Network service entities may increase revenue by identifying opportunities to participate in missions suited to their capabilities.
摘要:
A mechanism and framework is disclosed for translating high level goal statements to policy rules. In a first step, high level goal statements are translated to network services. In a second step, the network services are translated to network parameters. In a third step, the network parameters are translated to policy rules. The first step may be facilitated with Web Ontology Language (“OWL”) and semantic templates. Advantages of automated mission goal statement to policy statement translation for surveillance missions include more reliable and faster planning and allocation of resources in support of the missions. Further, dynamic allocation of network resources facilitates adapting to changing conditions and more graceful degradation in adverse circumstances. The need for subject matter experts is also expected to be mitigated.
摘要:
A method and apparatus for monitoring the transportation of medical images on a communication network includes a medical image transport service (MITS) that may be used to notify clients of the status of scheduled requests. The MITS may be configured to provide numerous notifications, such as the scheduled time for delivery, changes in scheduled time for delivery, delays associated with delivery at the scheduled time, and likely resolutions to network or other delays attendant to the requested transaction. The notifications may be sent in-band on the network or out-of-band on a parallel network. Where the notification relates to a delayed transaction, the notification message may contain the reason for the delay, the source of the delay, its location, and if other images can still be retrieved. The notification may also include a likely resolution of the problem and an estimate of when the problem will be resolved.
摘要:
The present invention is directed to the processing of medical image data in a network environment as a network service. In an embodiment of the invention, a network image fusion service is provided that is configured to receive a plurality of image data and to execute at least one image fusion processes in both software and hardware. The image fusion process logic has been divided between instructions to be executed in software and logic to be executed in hardware. The software instructions may be executed by a processor within the network element or in a processor associated with network service. The hardware logic is executed in a reconfigurable programmable logic device such as a Field Programmable Gate Array (FPGA). The network service may be included within the network element, be separate from a network element but associated therewith, or may be external to the network and accessible by a plurality of network elements.