Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aparicio Carranza is active.

Publication


Featured researches published by Aparicio Carranza.


Handbook of Fiber Optic Data Communication (Fourth Edition)#R##N#A Practical Guide to Optical Networking | 2013

Cloud Computing Data Center Networking

Carolyn J. Sher DeCusatis; Aparicio Carranza

This chapter describes cloud computing technology and its impact on the data center network. We define the essential elements of cloud computing, including on-demand service, broad network access, resource pooling, elastic provisioning, and metered service at various quality of service levels. Models including software, platform, and infrastructure as a service (SaaS, PaaS, IaaS) are discussed, along with private, public, and hybrid cloud models and cloud service providers. Unique requirements of a cloud network include virtualization and virtual machine mobility, security, hypervisor virtual switching, converged storage, and new routing protocols such as Transparent Interconnection of Lots of Links (TRILL) and Shortest Path Bridging (SPB). We conclude with a brief discussion of software-defined networking (SDN) in the context of cloud computing.


Performance, quality of service, and control of next-generation communication networks. Conference | 2004

Modeling of wavelength multiplexing networks for storage area networking

Aparicio Carranza; Casimer M. DeCusatis

Recently, there has been increased interest in the use of optical networks for disaster recovery of large computer systems by extending storage area networks (SANs) over hundreds of kilometers or more. These optical datacom networks, which incorporate wavelength division multiplexing (WDM), have several unique requirements. The purpose of this work has been to develop computer simulation tools for optical datacom networks. The models are capable of automatically designing a WDM network configuration based on minimal input; validating the design against any protocol-specific requirements; suggesting alternative configurations; and optimizing the design based on metrics including performance of the network (efficient use of bandwidth to support the attached computing devices), reliability (searching the proposed topology for single points of failure), scalability (based on user input of potential future upgrade paths), and cost of the associated networking equipment. The model incorporates typical computer performance data, which allows the prediction of system performance before the network is implemented. We present simulation results for a variety of MAN topologies, using currently available WDM networking equipment. These results have been validated by comparison with an enterprise optical networking testbed constructed for storage area networks.


Frontiers in Optics | 2004

Simulation of Metropolitan Area Wavelength Multiplexing Networks for Data Communication

Aparicio Carranza; Casimer M. DeCusatis

We have developed simulation tools for configuration of datacom networks over wavelength division multiplexing networks. Various network topologies are compared to optimize link budgets and performance of latency sensitive protocols while preserving high availability redundant path routing. This modeling is validated against an enterprise network testbed for storage area networks.


The 15th LACCEI International Multi-Conference for Engineering, Education, and Technology: “Global Partnership for Development and Engineering Education” | 2017

Automated Wireless Network Penetration Testing Using Wifite and Reaver

Aparicio Carranza; Josue Magallanes; Casimer DeCusatis; Javier Espinal

Wireless access points are susceptible to many types of cybersecurity attacks. In particular, by attacking the Wi-FI Protected Setup (WPS) passcode using a brute force dictionary attack, it is possible to circumvent the use of password-based network encryption and gain access to the wireless network content. In this tutorial paper, we investigate penetration testing of wireless networks using open source tools which have been automated in Kali Linux, including Wifite and Reaver. Traffic on wireless networks which have been compromised in this manner are further analyzed using the Wireshark network protocol analyzer.


The Fourteen LACCEI International Multi-Conference for Engineering, Education, and Technology: “Engineering Innovations for Global Sustainability” | 2016

Wireless Network Penetration Testing using Kali Linux on BeagleBone Black

Aparicio Carranza; Casimer DeCusatis

The development of powerful, low cost mobile compute platforms has enabled a host of new penetration testing applications. We investigate the Kali Linux operating system and its embedded security tools, hosted on the BeagleBone Black (BBB) hardware platform. This combination creates a powerful, portable ethical hacking tool. Specific tools offered by Kali Linux such as Ettercap-Graphical, Wireshark, Aircrack-ng, and ARP poison are used to perform in-depth, practical penetration testing. Experimental results include a demonstration of how Kali Linux on the BBB can be used to perpetuate a denial of service attack by de-authenticating wireless access from another host. Further, we demonstrate the collection of valuable data including user IDs, usernames, and passwords obtained from a reconnaissance attack. Keywords-Aircrack-ng, Beagle Bone Black (BBB), EttercapGraphical, Kali Linux, Wireshark, Vertical Scanning, Horizontal


dependable autonomic and secure computing | 2015

Methodology for an Open Digital Forensics Model Based on CAINE

Casimer DeCusatis; Aparicio Carranza; Alassane Ngaide; Sundas Zafar; Nestor Landaez

With the widespread adoption of public and private cloud computing environments, in addition to traditional enterprise-class data centers, cybersecurity has become increasingly important. In particular, forensic analysis of digital evidence has received increased attention. We investigate a relatively new suite of cyber-forensic tools in the open source CAINE Linux distribution. We propose how tools such as Guymager, Autopsy, Fred, and Photorec can be applied as part of a four tier forensic architecture. Experimental results are provided which demonstrate the application of these tools in a practical investigation.


Proceedings of SPIE, the International Society for Optical Engineering | 2010

Introduction and comparison of next-generation mobile wireless technologies

Syed Rashid Zaidi; Shahab Hussain; Mohamed A. Ali; Ajaz Sana; Samir Saddawi; Aparicio Carranza

Mobile networks and services have gone further than voice-only communication services and are rapidly developing towards data-centric services. Emerging mobile data services are expected to see the same explosive growth in demand that Internet and wireless voice services have seen in recent years. To support such a rapid increase in traffic, active users, and advanced multimedia services implied by this growth rate along with the diverse quality of service (QoS) and rate requirements set by these services, mobile operator need to rapidly transition to a simple and cost-effective, flat, all IP-network. This has accelerated the development and deployment of new wireless broadband access technologies including fourth-generation (4G) mobile WiMAX and cellular Long-Term Evolution (LTE). Mobile WiMAX and LTE are two different (but not necessarily competing) technologies that will eventually be used to achieve data speeds of up to 100 Mbps. Speeds that are fast enough to potentially replace wired broadband connections with wireless. This paper introduces both of these next generation technologies and then compares them in the end.


Frontiers in Optics | 2005

Quantum Cryptography Systems Using Photonic Crystal Fibers

Aparicio Carranza; Casimer M. DeCusatis

In this paper, we report computer simulations of photonic crystal fibers and attempts to minimize polarization mode dispersion. This is expected to improve performance of quantum cryptography systems.


optical fiber communication conference | 2014

Enabling autonomic provisioning in SDN cloud networks with NFV service chaining

Robert Cannistra; Benjamin Carle; Matthew A. Johnson; Junaid Kapadia; Zach Meath; Mary Miller; Devin Young; Casimer M. DeCusatis; Todd Bundy; Gil Zussman; Keren Bergman; Aparicio Carranza; Carolyn Sher-DeCusatis; Andrew Pletch; Raymond Ransom


Journal of Computing Sciences in Colleges | 2016

iPractice: a self-assessment tool for students learning computer programming in an urban campus

Benito Mendoza; José Reyes-Alamo; Huixin Wu; Aparicio Carranza; Laura Zavala

Collaboration


Dive into the Aparicio Carranza's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ajaz Sana

City University of New York

View shared research outputs
Top Co-Authors

Avatar

Benito Mendoza

University of South Carolina

View shared research outputs
Top Co-Authors

Avatar

Shahab Hussain

City University of New York

View shared research outputs
Top Co-Authors

Avatar

Alassane Ngaide

New York City College of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew Pletch

State University of New York System

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Carolyn J. Sher DeCusatis

New York City College of Technology

View shared research outputs
Top Co-Authors

Avatar

Carolyn Sher-DeCusatis

New York City College of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge