Business Data Communications and Networking A Research Perspective 1st Edition by Jairo Gutierrez ISBN 1599042746 9781599042749 Download
Business Data Communications and Networking A Research Perspective 1st Edition by Jairo Gutierrez ISBN 1599042746 9781599042749 Download
https://ebookball.com/product/data-and-computer-communications-5th-
edition-by-william-stallings-isbn-0024154253-978-0024154255-16348/
Business Data
Communications
and Networking:
A Research Perspective
Copyright © 2007 by Idea Group Inc. All rights reserved. No part of this book may be reproduced in any
form or by any means, electronic or mechanical, including photocopying, without written permission from the
publisher.
Product or company names used in this book are for identification purposes only. Inclusion of the names of the
products or companies does not indicate a claim of ownership by IGI of the trademark or registered trademark.
Business data communications and networking : a research perspective / Jairo Gutierrez, editor.
p. cm.
Summary: "This book addresses key issues for businesses utilizing data communications and the increasing
importance of networking technologies in business; it covers a series of technical advances in the field while
highlighting their respective contributions to business or organizational goals, and centers on the issues of net-
work-based applications, mobility, wireless networks and network security"--Provided by publisher.
Includes bibliographical references and index.
ISBN 1-59904-274-6 (hardcover) -- ISBN 1-59904-275-4 (softcover) -- ISBN 1-59904-276-2 (ebook)
1. Computer networks. 2. Wireless communication systems. 3. Data transmission systems. 4. Business com-
munication--Data processing. I. Gutierrez, Jairo, 1960-
TK5105.5.B878 2007
004.6--dc22
2006031360
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are
those of the authors, but not necessarily of the publisher.
Business Data
Communications
and Networking:
A Research Perspective
Table of Contents
Preface............................................................................................................................vi
Section.I:.Network.Design.and.Application.Issues
Chapter.I
Design.of.High.Capacity.Survivable.Networks........................................................... 1
Varadharajan Sridhar, Management Development Institute, Gurgaon, India
June Park, Samsung SDS Company Ltd., Seoul, South Korea
Chapter.II
A Data Mining Driven Approach for Web Classification and Filtering
Based.on.Multimodal.Content.Analysis..................................................................... 20
Mohamed Hammami, Faculté des Sciences de Sfax, Tunisia
Youssef Chahir, Université de Caen, France
Liming Chen, Ecole Centrale de Lyon, France
Chapter.III
Prevalent Factors Involved in Delays Associated with Page Downloads................ 55
Kevin Curran, University of Ulster at Magee, UK
Noel Broderick, University of Ulster at Magee, UK
v
Chapter.IV
Network.Quality.of.Service.for.Enterprise.Resource.Planning.Systems:.
A.Case.Study.Approach............................................................................................... 68
Ted Chia-Han Lo, University of Auckland, New Zealand
Jairo Gutiérrez, University of Auckland, New Zealand
Chapter.V
Cost-Based.Congestion.Pricing.in.Network.Priority.Models.
Using.Axiomatic.Cost.Allocation.Methods.............................................................. 104
César García-Díaz, University of Groningen, The Netherlands
Fernando Beltrán, University of Auckland, New Zealand
Section.II:.Mobility
Chapter.VI
Mobile.Multimedia:.Communication.Technologies,.Business.Drivers,.
Service.and.Applications........................................................................................... 128
Ismail Khalil Ibrahim, Johannes Kepler University Linz, Austria
Ashraf Ahmad, National Chiao Tung University, Taiwan
David Taniar, Monash University, Australia
Chapter.VII
Mobile.Information.Systems.in.a.Hospital.Organization.Setting......................... 151
Agustinus Borgy Waluyo, Monash University, Australia
David Taniar, Monash University, Australia
Bala Srinivasan, Monash University, Australia
Chapter.VIII
Data.Caching.in.a.Mobile.Database.Environment................................................. 187
Say Ying Lim, Monash University, Australia
David Taniar, Monash University, Australia
Bala Srinivasan, Monash University, Australia
Chapter.IX
Mining.Walking.Pattern.from.Mobile.Users........................................................... 211
John Goh, Monash University, Australia
David Taniar, Monash University, Australia
v
Section.III:.Wireless.Deployment.and.Applications
Chapter.X
Wi-Fi Deployment in Large New Zealand Organizations: A Survey . ................. 244
Bryan Houliston, Auckland University of Technology, New Zealand
Nurul Sarkar, Auckland University of Technology, New Zealand
Chapter.XI
Applications and Future Trends in Mobile Ad Hoc Networks.............................. 272
Subhankar Dhar, San Jose University, USA
Section.IV:.Network.Security
Chapter.XII
Addressing WiFi Security Concerns........................................................................ 302
Kevin Curran, University of Ulster at Magee, UK
Elaine Smyth, University of Ulster at Magee, UK
Chapter.XIII
A SEEP Protocol Design Using 3BC, ECC(F2m).and.HECC.Algorithm................ 328
Byung Kwan Lee, Kwandong University, Korea
Seung Hae Yang, Kwandong University, Korea
Tai-Chi Lee, Saginaw Valley State University, USA
Chapter.XIV
Fighting the Problem of Unsolicited E-Mail Using a Hashcash
Proof-of-Work.Approach.......................................................................................... 346
Kevin Curran, University of Ulster at Magee, UK
John Honan, University at Ulster at Magee, UK
About.the.Authors...................................................................................................... 375
Index............................................................................................................................ 381
v
Preface
Research in the area of data communications and networking is well and alive as this col-
lection of contributions show. The book has received enhanced contributions from the au-
thors that published in the inaugural volume of the International Journal of Business Data
Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are
divided in four themes: (1) network design and application issues, (2) mobility, (3) wireless
deployment and applications, and (4) network security. The first two sections gathering the
larger number of chapters, which is not surprising given the popularity of the issues presented
on those sections. Within each section the chapters have been roughly organized following
the Physical layer to Application layer sequence with lower-level issues discussed first.
This is not an exact sequence since some chapters deal with cross-layer aspects; however,
it facilitates the reading of the book in a more-or-less logical manner. The resulting volume
is a valuable snapshot of some of the most interesting research activities taking place in the
field of business data communications and networking.
The first section, Network Design and Application Issues, starts with Chapter I, “Design of
High Capacity Survivable Networks,” written by Varadharajan Sridhar and June Park. In it the
authors define Survivability as the capability of keeping at least “one path between specified
network nodes so that some or all of traffic between nodes is routed through”. Based on that
definition the chapter goes on to discuss the issues associated with the design of a surviv-
able telecommunications network architecture that uses high-capacity transport facilities.
Their model considers the selection of capacitated links and the routing of multicommodity
traffic flows with the goal of minimizing the overall network cost. Two node disjoint paths
are selected for each commodity. In case of failure of the primary path, a portion of the
traffic for each commodity will be rerouted through the secondary path. The methodology
presented in the chapter can be used by the network designer to construct cost-effective high
capacity survivable ring networks of low to medium capacity.
v
In Chapter II, “A Data Mining Driven Approach for Web Classification and Filtering Based
on Multimodal Content Analysis,” Mohamed Hammami, Youssef Chahir, and Liming Chen
introduce WebGuard an automatic machine-learning based system that can be used to ef-
fectively classify and filter objectionable Web material, in particular pornographic content.
The system focuses on analyzing visual skin-color content along with textual and structural
content based analysis for improving pornographic Web site filtering. While most of the
commercial filtering products on the marketplace are mainly based on textual content-based
analysis such as indicative keywords detection or manually collected black list checking,
the originality of the authors’ work resides on the addition of structural and visual content-
based analysis along with several data mining techniques for learning about and classifying
content. The system was tested on the MYL test dataset which consists of 400 Websites
including 200 adult sites and 200 non-pornographic ones. The Web filtering engine scored
a high classification accuracy rate when only textual and structural content based analysis
are used, and a slightly higher classification accuracy rate when skin color-related visual
content-based analysis is added to the system. The basic framework of WebGuard can apply
to other categorization problems of Web sites which combine, as most of them do today,
textual and visual content.
Chapter III, “Prevalent Factors involved in Delays Associated with Page Downloads,” tackles
an issue that concerns most Internet users: response times associated with Web page laten-
cies. Kevin Curran and Noel Broderick studied the usage of images and the effect they have
on page retrieval times. A representative sample of academic institutions’ Websites which
were image-intensive was selected and used in the research. Their findings showed that the
prevalent factor that affects how quickly a Web site performs is the type of Web hosting
environment that the site is deployed in. They also found that Web users are faced with a
sliding scale of delays, with no one Web page taking the same time to load on two separate
occasions. It is the number of application packets, not bytes, and the number of simultane-
ous users of the part of the Internet involved in the connection that determines the Web page
latency and satisfaction levels. Finally, the authors discuss the fact that improvements on the
coding of images can reduce latencies but some of the most efficient encoding techniques,
such as PNG, only start to report benefits with larger (more than 900 bytes) images. A large
number of images found during the testing fell in the sub-900 group.
The research reported in Chapter IV, “Network Quality of Service for Enterprise Resource
Planning Systems: A Case Study Approach” by Ted Chia-Han Lo and Jairo Gutiérrez, studied
the relevance of the application of network quality of service (QoS) technologies for modern
enterprise resource planning (ERP) systems, explored the state-of-art for QoS technologies
and implementations and, more importantly, provided a framework for the provision of QoS
for ERP systems that utilise Internet protocol (IP) networks. The authors were motivated to
conduct this research after discovering that very little had been investigated on that particular
aspect of ERP systems, even though there was an increasing realisation about the impor-
tance of these types of applications within the overall mix of information systems deployed
in medium and large organisations. Based upon the research problem and the context of
research, a case study research method was selected. Four individual cases—including both
leading ERP vendors and network technology vendors—were conducted. The primary data
collection was done using semi-structured interviews and this data was supplemented by
an extensive array of secondary material. Cross-case analysis confirmed that the traditional
approaches for ensuring the performance of ERP systems on IP networks do not address
network congestion and latency effectively, nor do they offer guaranteed network service
v
quality for ERP systems. Moreover, a cross-case comparative data analysis was used to review
the pattern of existing QoS implementations and it concluded that while QoS is increasingly
being acknowledged by enterprises as an important issue, its deployment remains limited.
The findings from the cross-case analysis ultimately became the basis of the proposed
framework for the provision of network QoS for ERP systems. The proposed framework
focuses on providing a structured, yet practical approach to implement end-to-end IP QoS
that accommodate both ERP systems and their Web-enabled versions based on state-of-art
traffic classification mechanisms. The value of the research is envisioned to be most visible
for two major audiences: enterprises that currently utilised best-effort IP networks for their
ERP deployments and ERP vendors.
The last chapter on this section, Chapter V, “Cost-Based Congestion Pricing in Network
Priority Models Using Axiomatic Cost Allocation Methods,” was written by Fernando Beltrán
and César García-Díaz. The chapter deals with the efficient distribution of congestion costs
among network users. The authors start with a discussion about congestion effects and their
impact on shared network resources. They also review the different approaches found in
the literature, ranging from methods that advocate for congestion-based pricing to methods
that, after being critical about considering congestion, advocate for price definition based
on the investors’ need for return on their investment. Beltrán and García then proceed to
introduce an axiomatic approach to congestion pricing that takes into account some of the
prescriptions and conclusions found in the literature. The method presented in the chapter is
defined on the grounds of axioms that represent a set of fundamental principles that a good
allocation mechanism should have.
The second theme of this book is addressed in the second section, Mobility. The chapters
in this section share that common denominator: the challenges addressed are introduced
by that defining characteristic. The first contribution in this section, Chapter VI, “Mobile
Multimedia: Communication Technologies, Business Drivers, Service and Applications,”
is written by Ismail Khalil Ibrahim, Ashraf Ahmad, and David Taniar. It serves as a great
introduction to the topic of mobility and in particular the field of mobile multimedia which
the authors define as “multimedia information exchange over wireless networks or wireless
Internet.” This chapter discusses the state-of-the-art of the different communication tech-
nologies used to support mobile multimedia, describes the key enabling factor of mobile
multimedia: the popularity and evolution of mobile computing devices, coupled with fast
and affordable mobile networks. Additionally, the authors argue that the range and com-
plexity of applications and services provided to end-users also play an important part in the
success of mobile multimedia.
Chapter VII, “Mobile Information Systems in a Hospital Organization Setting,” written by
Agustinus Borgy Waluyo, David Taniar, and Bala Srinivasan, deals with the issue of provid-
ing mobility in the challenging environment of a hospital. The chapter discusses a practical
realisation of an application using push and pull based mechanisms in a wireless ad-hoc
environment. The pull mechanism is initiated by doctors as mobile clients retrieving and
updating patient records in a central database server. The push mechanism is initiated from
the server without a specific request from the doctors. The application of the push mecha-
nism includes sending a message from a central server to a specific doctor or multicasting a
message to a selected group of doctors connected to the server application. The authors also
discuss their future plans for the system which include the addition of a sensor positioning
device, such as a global positioning system (GPS), used to detect the location of the mobile
users and to facilitate the pushing of information based on that location.
x
Chapter VIII also tackles the issue of mobility but based on a study of the available types
of data caching in a mobile database environment. Say Ying Lim, David Taniar, and Bala
Srinivasan explore the different types of possible cache management strategies in their
chapter, “Data Caching in a Mobile Database Environment.” The authors firstly discuss the
need for caching in a mobile environment and proceed to present a number of issues that
arise from the adoption of different cache management strategies and from the use of strate-
gies involving location-dependent data. The authors then concentrate on semantic caching,
where only the required data is transmitted over the wireless channel, and on cooperative
caching. They also discuss cache invalidation strategies, for both location and non location
dependent queries. The chapter serves as a valuable starting point for those who wish to gain
some introductory knowledge about the usefulness of the different types of cache manage-
ment strategies that can be use in a typical mobile database environment.
In the last chapter of this section, Chapter IX, “Mining Walking Pattern from Mobile Us-
ers,” John Goh and David Taniar deal with the issue of extracting patterns and knowledge
from a given dataset, in this case a user movement database. The chapter reports research
on the innovative examination, using data mining techniques, of how mobile users walks
from one location of interest to another location of interest in the mobile environment.
Walking pattern is the proposed method whereby the source data is examined in order to
find out the 2-step, 3-step and 4-step walking patterns that are performed by mobile users.
A performance evaluation shows the tendency for a number of candidate walking patterns
with the increase in frequency of certain location of interests and steps. The walking pattern
technique has proven itself to be a suitable method for extracting useful knowledge from
the datasets generated by the activities of mobile users. These identified walking patterns
can help decision makers in terms of better understanding the movement patterns of mobile
users, and can also be helpful for geographical planning purposes.
The third section, Wireless Deployment and Applications, has two contributions. Chapter X,
“Wi-Fi Deployment in Large New Zealand Organizations: A Survey,” co-written by Bryan
Houliston and Nurul Sarkar, reports on research conducted on New Zealand where 80 large
organizations were asked about their level of Wi-Fi networks (IEEE 802.11b) deployment,
reasons for non-deployment, the scope of deployment, investment in deployment, problems
encountered, and future plans. The authors’ findings show that most organizations have at
least considered the technology, though a much smaller proportion has deployed it on any
significant scale. A follow up review, included in the chapter, of the latest published case
studies and surveys suggests that while Wi-Fi networks deployment is slowing, interest is
growing on the issue of wider area wireless networks.
The second chapter in the section, by Subhankar Dhar, is “Applications and Future Trends in
Mobile Ad Hoc Networks,” and covers, in a survey style, the current state of the art of mobile
ad hoc networks and some important problems and challenges related to routing, power
management, location management, security as well as multimedia over ad hoc networks.
The author explains that a mobile ad hoc network (MANET) is a temporary, self-organizing
network of wireless mobile nodes without the support of any existing infrastructure that
may be readily available on the conventional networks and discusses how, since there is
no fixed infrastructure available for MANET with nodes being mobile, routing becomes a
very important issue. In addition, the author also explains the various emerging applications
and future trends of MANET.
x
The last section, Network Security, begins with Chapter XII, “Addressing WiFi Security
Concerns.” In it, Kevin Curran and Elaine Smyth discuss the key security problems linked
to WiFi networks, including signal leakages, WEP-related (wired equivalent protocol)
weaknesses and various other attacks that can be initiated against WLANs. The research
reported includes details of a “war driving” expedition conducted by the authors in order to
ascertain the number of unprotected WLAN devices in use in one small town. The authors
compiled recommendations for three groups of users: home users, small office/home office
(SOHO) users and medium to large organisations. The recommendations presented suggest
that home users should implement all the security measures their hardware offers them, they
should include WEP security at the longest key length permitted and implement firewalls
on all connected PCs changing their WEP key on a weekly basis. The Small Office group
should implement WPA-SPK; and the medium to large organisations should implement one
or more of either: WPA Enterprise with a RADIUS server, VPN software, IDSs, and provide
documented policies in relation to WLANs and their use.
Chapter XIII, “A SEEP Protocol Design Using 3BC, ECC(F2m), and HECC Algorithm,”
by Byung Kwan Lee, Seung Hae Yang, and Tai-Chi Lee, reports on collaborative work be-
tween Kwandong University in Korea and Saginaw Valley State University in the U.S. In
this contribution the authors propose a highly secure electronic payment protocol that uses
elliptic curve cryptosystems, a secure hash system and a block byte bit cipher to provide
security (instead of the more common RSA-DES combination). The encroaching of e-com-
merce into our daily lives makes it essential that its key money-exchange mechanism, online
payments, be made more reliable through the development of enhanced security techniques
such as the one reported in this chapter.
Finally, Chapter XIV deals with “Fighting the Problem of Unsolicited E-Mail Using a
Hashcash Proof-of-Work Approach.” Authors Kevin Curran and John Honan present the
Hashcash proof-of-work approach and investigate the feasibility of implementing a solution
based on that mechanism along with what they called a “cocktail” of antispam measures
designed to keep junk mail under control. As reported by the researchers in this chapter, a
potential problem with proof-of-work is that disparity across different powered computers
may result in some unfortunate users spending a disproportionately long time calculating a
stamp. The authors carried out an experiment to time how long it took to calculate stamps
across a variety of processor speeds. It is concluded from the analysis of the results that due
to this problem of egalitarianism, “hashcash” (or CPU-bound proof-of-work in general) is
not a suitable approach as a stand-alone anti-spam solution. It appears that a hybrid (a.k.a.
“cocktail”) anti-spam system in conjunction with a legal and policy framework is the best
approach.
We hope that you enjoy this book. Its collection of very interesting chapters gives the reader
a good insight into some of the key research work in the areas of wireless networking,
mobility and network security. Our goal was to provide an informed and detailed snapshot
of these fast moving fields. If you have any feedback or suggestions, please contact me via
e-mail at [email protected].
Section I:
Network Design
and Application Issues
x
Design of High Capacity Survivable Networks
Chapter.I
Design.of.High.Capacity.
Survivable.Networks
Varadharajan Sridhar, Management Development Institute, Gurgaon, India
Abstract
Survivability, also known as terminal reliability, refers to keeping at least one path between
specified network nodes so that some or all of traffic between nodes is routed through.
Survivability in high capacity telecommunication networks is crucial as failure of network
component such as nodes or links between nodes can potentially bring down the whole
communication network, as happened in some real-world cases. Adding redundant network
components increases the survivability of a network with an associated increase in cost. In
this chapter we consider the design of survivable telecommunications network architecture
that uses high-capacity transport facilities. The model considers selection of capacitated
links and routing of multicommodity traffic flow in the network that minimizes overall net-
work cost. Two node disjoint paths are selected for each commodity. In case of failure of the
primary path, a portion of the traffic for each commodity is rerouted through the secondary
path. The methodology presented in this chapter can be used by the network designer to
construct cost-effective high capacity survivable networks.
Copyright © 2007, Idea Group Inc. Copying or distributing in print or electronic forms without written permission
of Idea Group Inc. is prohibited.
Sridhar & Park
Introduction
Optic fiber and high capacity transmission facilities are being increasingly deployed by
Telecommunication companies for carrying voice, data, and multimedia traffic. Local
(some times referred to as basic) telecom service providers are spending tens of billions of
dollars on fiber-based equipment and facilities to replace or augment the existing facilities
to provide high bandwidth transport. This has led to sparse networks with larger amount of
traffic carried on each link compared to traditional bandwidth limiting technologies which
deployed dense networks. One of such technologies is synchronous digital hierarchy (SDH)
standardized by the International Telecommunications Union. SDH decreases the cost and
number of transmission systems public networks need and makes it possible to create a high
capacity telecommunications superhighway to transport broad range of signals at very high
speeds (Shyur & Wen, 2001). Because of their sparse nature, these networks inherently
have less reliability. Failure of a single node or link in the network can cause disruptions to
transporting large volume of traffic, if alternate path is not provided for routing the affected
traffic. Though backup links can be provided to improve the reliability of such sparse net-
works, it could increase the cost of the networks substantially. The challenge is to improve
the reliability of the networks at minimal cost. Researchers have looked at methods of im-
proving reliability of such networks. Detailed discussions on the importance of survivability
in fiber network design can be found in Wu, Kolar, and Cardwell (1988) and Newport and
Varshney (1991). Recently, vulnerabilities and associated security threats of information and
communication networks have prompted researchers to define survivability as the capability
of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures or
accidents (Redman, Warren, & Hutchinson, 2005).
Networks with ring architecture are also being increasingly deployed in high capacity net-
works to provide survivability. Synchronous optical network (SONET) uses a self-healing
ring architecture that enables the network to maintain all or part of communication in the
event of a cable cut on a link or a node failure. SONET networks are being increasingly
deployed between central offices of the telecommunication companies and between point
of presence (POP) of traffic concentration points. SONET-based transmission facilities are
also being deployed increasingly to provide broadband facilities to business customers and
government agencies. Operationally such self-healing ring networks divert the flow along
an alternative path in the ring in case of failure of a node or link.
For a discussion of the use of rings in telecommunication networks, the reader is referred
to Cosares, Deutsch, and Saniee (1995). Cosares et al. (1995) describes the implementation
of a decision support system called SONET toolkit developed by Bell Core for constructing
SONET rings. The SONET toolkit uses a combination of heuristic procedures to provide
economic mix of self-healing rings and other architectures that satisfy the given surviv-
ability requirements. Chunghwa Telecom, the full service telecommunications carrier in
Taiwan, has developed a tool for planning linear and ring architectures of high-capacity
digital transmission systems (Shyur & Wen, 2001). The tool reduces planning and labor
costs by 15 to 33%. Goldschmidt, Laugier, and Olinick (2003) present the case of a large
telecommunication service provider who chose SONET ring architecture for interconnect-
ing customer locations.
Copyright © 2007, Idea Group Inc. Copying or distributing in print or electronic forms without written permission
of Idea Group Inc. is prohibited.
Random documents with unrelated
content Scribd suggests to you:
verbal descriptions an idea of the general character of her Martian
visions.
Let us see now what kind of information the messages and
somnambulisms of Hélène furnish us in regard to the brilliant planet
whose complicated revolutions formerly revealed to a Kepler the
fundamental secrets of modern astronomy.
Esenale
We have seen (p. 164) that this name was hinted at by Leopold on
the 22d of October, 1896, without any other explanation as a means
of obtaining the signification of the Martian words. Then at the first
recurrence to this talisman (November 2d, see p. 166) we learn only
that he was a deceased inhabitant of Mars, whose acquaintance
Leopold had recently made in interplanetary space. It was only at
the following seance (November 8th), where we find Mme. Mirbel,
that, after an incarnation of her son Alexis, followed by the scene of
translation (see text 3) and in response to questions of the sitters—
which answered very well the purpose of suggestion—Leopold
affirmed by the left index-finger that Esenale was Alexis Mirbel. It
cannot be determined whether that identification constituted a
primitive fact which it pleased Leopold to keep secret, only revealing
it at the end of a seance at which Mme. Mirbel was present, or
whether, as I am inclined to regard it, it was only established at that
same seance, under the domination of the circumstances of the
moment. As a translator of Martian, Esenale did not show great
talent. He had to be entreated, and it was necessary often to repeat
his name while pressing or rubbing Hélène’s forehead, in order to
obtain the exact meaning of the last texts which had been given. He
possessed, it is true, an excellent memory, and faithfully reproduced,
before giving it word by word, the French for the Martian phrases
which Hélène had heard several weeks before and only seen again
five or six months afterwards (text 24), and of which there had been
no previous opportunity to obtain a translation. But it was to these
latter texts, not yet interpreted, that he confined his willingness; on
two occasions only did he add, of his own accord, some words of no
importance (texts 15 and 36.) Text No. 19, for instance, has always
remained untranslated, and my later efforts (June 4, 1899) to obtain
the meaning of the unknown words milé piri have been in vain;
moreover, Esenale has not been able to fill up the gaps in text No.
24.
Alexis Mirbel, after the two first Martian seances, reported on pp.
146 and 154, called Esenale, often accorded his mother, in scenes of
incarnation, somewhat pathetic, touching messages of filial
tenderness and consolation (texts 3, 4, 11, 15, and 18). It is to be
noted that, although opportunities for continuing this rôle were not
wanting, he appears to have completely abandoned it for the last
two years. His last message of this kind (October 10, 1897, text 18)
followed a month after a curious seance in which Leopold sought to
explain to us spontaneously—no one had mentioned the subject—
certain flagrant contradictions in the first manifestations of Alexis-
Esenale. Here is a résumé of that scene, with the text of Leopold’s
communication:
September 12, 1897.—After sundry waking visions, Mlle. Smith
hears Leopold speaking; her eyes are closed, and, appearing to be
asleep, she repeats, mechanically and in a slow and feeble voice, the
following words, which her guide addresses to her: “Thou art going
to pay close attention. Tell them now [the sitters] to keep as quiet as
possible, that is what often mars the phenomena, the comings and
goings, and the idle chatter of which you are never weary. You
recollect there was, several months ago, a young man, that young
man Alexis Mirbel, who came to give counsel to his mother at a
reunion you held with M. (I do not understand the name he gave) ...
at Carouge[16].... Well, at that moment he happened—that is to say,
two days before—to die on ... (I could not understand the name) ...
where he had been ... or he had regained life.[17] This is why I have
come to tell you to-day he was in that phase of separation of the
material part from the soul which permitted him to recollect his
previous existence—that is to say, his life here below in this state; he
not only recollects his first mother, but can speak once more the
language he used to speak with her. Some time after, when the soul
was finally at rest, he no longer recollected that first language; he
returns, he hovers about (his mother), sees her with joy, but is
incapable of speaking to her in your language.[18] Whether it will
return to him I do not know and cannot say, but I believe that it will.
And now listen.” Here Mlle. Smith seems to awake, opens her eyes,
and has a long Martian vision, which she describes in detail. She
now sees a little girl in a yellow robe, whose name she hears as
Anini Nikaïné, occupied with various childish games—e. g., with a
small wand she makes a number of grotesque little figures dance in
a white tub, large and shallow, full of sky-blue water. Then come
other persons, and, finally, Astané, who has a pen in his fingers,
and, little by little, takes hold of Hélène’s arm and throws her into a
deep trance for the purpose of causing her to write text No. 17.
These spontaneous explanations of Leopold are interesting in that
they betray clearly the subliminal desire to introduce some order and
logic into the incoherences of the mediumistic reveries. It is a form
of the process of justification and retrospective interpretation
intended to make the incidents of the past accord with the dominant
ideas of the present (see p. 95). In appearance, the theory upon
which Leopold rested, after having doubtless meditated long, is quite
awkward; but perhaps it was difficult for him to do better, since no
one can accomplish the impossible.
astané
“The great man Astané” is the reincarnation on Mars of the
Hindoo fakir Kanga, who was a devoted companion and friend of
Simandini. He has preserved in his new existence the special
character of savant or of sorcerer, which he formerly possessed in
India, and he has equally retained all his affection for his princess of
old, who has been restored to him in Mlle. Smith; he frequently
utilizes his magic powers to evoke her—that is to say, to re-enter
into spiritual communication with her, notwithstanding the distances
between their actual places of habitation. The ways and means of
that evocation remain, however, enveloped in mystery. We cannot
say whether it was Hélène that rejoined Astané on Mars during her
somnambulism, or whether it was he who descended “fluidly”
towards her and brought to her the odors of the far-distant planet.
When Astané says to Hélène, during a seance: “Come to me an
instant. Come and admire these flowers,” etc. (text 8), or shows her
the curiosities of his Martian abode, it seems as though he had really
called her to him through space; but when he appears to her, while
awake, at the edge of her bath-tub, and expresses his chagrin at
finding her still on this miserable earth (text 7), it must be admitted
that it is he who has descended to her and inspires her with these
visions of an upper world. It is of no importance, on the whole. It is
here to be noted that, in these evocations, Astané only manifests
himself in visual and auditive hallucinations, never in tactile
impressions or those of general sensibility; in the sphere of emotion
his presence is accompanied by a great calm on the part of Hélène,
a profound bliss, and an ecstatic disposition, which is the correlative
and pendant of the happiness experienced by Astané himself (texts
10, 17, etc.) at finding himself in the presence of his idol of the past.
The social state of Astané—I should rather say his name, his quality
of sorcerer, and his previous terrestrial existence in the body of
Kanga—was not immediately revealed.
Nevertheless, at his first apparition (September 5, 1896, see p.
162), he rises superior to the crowd, inasmuch as he alone
possesses a flying-machine incomprehensible to us. In the following
weeks Mlle. Smith hears his name, and sees him again on many
occasions, as well as his house (Fig. 12), but it is only at the end of
two months and a half that his identity and his “evocative” powers
become known, at a seance at which I was not present, and during
which Hélène did not, contrary to her usual custom, fall completely
asleep. The following is a résumé of the notes, which I owe to the
kindness of M. Cuendet:
November 19, 1896.—Contrary to the experience of the preceding
seances, Mlle. Smith remained constantly awake, her arms free on
the table, conversing and even laughing all the while with the sitters.
The messages were obtained by means of visions and typtological
dictations. Hélène having asked Leopold how it happens that she
had been able to communicate with a being living on Mars, she has
a vision in which Astané appears to her in a costume more Oriental
than Martian. “Where have I seen that costume?” asks she; and the
table replies “In India,” which indicates that Astané is an ex-Hindoo
reincarnated on Mars. At the same time Hélène has a vision of an
Oriental landscape which she believes she has already seen before,
but without knowing where. She sees Astané there, carrying under
his arm rolls of paper of a dirty white color, and bowing in Oriental
fashion before a woman, also clothed in Oriental garments, whom
she also believes she has seen before. These personages appear to
her to be “inanimate, like statues.” The sitters ask whether the vision
was not a simple tableau (of the past) presented by Leopold; the
table replies in the affirmative, then inclines itself significantly
towards Mlle. Smith, when some one asked who that Oriental
woman might be, and the idea is put forth that possibly she
represents Simandini. Finally, to further questions of the sitters, the
table (Leopold) dictates again that Astané in his Hindoo existence
was called Kanga, who was a “sorcerer of the period”; then that
“Astané on the planet Mars possesses the same faculty of evocation
which he had possessed in India.” Leopold is then asked if the power
of Astané is greater than his. “A different power, of equal strength,”
replies the table. Finally, Hélène desiring to know whether Astané
when he evokes her sees her in her real character or that of her
Hindoo incarnation, the table affirms that he sees her in her Hindoo
character, and adds: “and, in consequence, under those
characteristics which she [Hélène] possesses to-day and which are in
such striking harmony with those of Simandini,” insisting on the N in
the middle of the name.
It is to be remarked that at this sitting it was Leopold who gave all
the information in regard to the past of Astané, and that he
recognizes in him a power over Hélène almost equal to his own. It is
strange that the accredited guide of Mlle. Smith, ordinarily so jealous
of his rights over her and ready to take offence at all rival
pretensions, so freely accords such prerogatives to Astané. This
unexpected mildness is still more surprising when the singular
similarity of position of these two personages in regard to Hélène is
considered. Kanga, the Hindoo fakir, holds in the life of Simandini
exactly the same place as Cagliostro in the life of Marie Antoinette,
the place of a sorcerer giving beneficial counsel, and at the same
time of a platonic adorer, and both of them in their actual rôles of
Astané and of Leopold preserve for Mlle. Smith the respectful
attachment which they had for her illustrious former existences. How
is it these two extra-terrestrial pretenders do not hate each other the
more cordially since their rival claims upon Hélène have identical
foundations? But, far from in the least disputing her possession, they
assist each other in the most touching fashion. When Astané writes
in Martian by Mlle. Smith’s right hand that the noise of the sitters
threatens to make him insane (see text 20) it is Leopold who comes
to his rescue in making them keep silent by his gestures with the left
arm. When Leopold indicates to me that the moment for pressing
Hélène’s forehead has arrived, it is Astané who lends him his pencil
in order that the message may be written (see below, seance of
September 12, 1897, and Fig. 23), and the exchange of powers
takes place between them without the medium experiencing the
least shock, and without its betraying itself outwardly otherwise than
by the difference of their handwriting. It is true that Leopold’s
apparitions to Hélène are infinitely more frequent and his
incarnations much more complete than those of Astané, who shows
himself to her at increasing intervals, and has never attained to
speaking by her mouth. It makes no difference: these two
personages resemble each other too much for mutual toleration—if
they are really two.
My conclusion presses. Astané is, at bottom, only a copy, a
double, a transposition in the Hindoo-Martian manner of Leopold.
They are two variations of one primitive theme. In regarding these
two beings, as I do, in the absence of proof to the contrary, not as
real and objective individualities, but as pseudo-personalities, dream
fictions, fantastic subdivisions of the hypnoid consciousness of Mlle.
Smith, it may be said that it is the same fundamental emotion which
has inspired these twin rôles, the details of which have been
adapted by the subliminal imagination to correspond to the diversity
of the circumstances. The contradiction painfully felt between the
proud aspirations of the grande dame and the vexing ironies of
reality has caused the two tragic previous existences to gush forth—
intrinsically identical, in spite of the differences of place and epoch—
of the noble girl of Arabia, having become Hindoo princess, burned
alive on the tomb of her despot of a husband, and of her Austrian
highness, having become Queen of France and sharing the
martyrdom of her spouse.
On parallel lines, in these two dreams issuing from the same
emotional source, it is the universal and constant taste of the human
imagination for the marvellous, allied to the very feminine need of a
respectful and slightly idolatrous protector, which on the one side
has created out of whole cloth the personage of Kanga-Astané, and
on the other hand has absorbed, without being careful in modifying
authentic history, that of Cagliostro-Leopold. Both are idealistic
sorcerers, of profound sagacity, tender-hearted, who have placed
their great wisdom at the service of the unfortunate sovereign and
made for her, of their devotion, amounting almost to adoration, a
tower of strength, a supreme consolation in the midst of all the
bitternesses of real life. And as Leopold acts as guide for Hélène
Smith in the general course of her actual earthly existence, so
Astané seemingly plays the same rôle in the moments of that life in
which Hélène leaves our sublunar world to fly away to the orb of
Mars.
Fig. 12. House of Astané. Blue sky; soil, mountains, and walls of a red color. The
two plants, with twisted trunks, have purple leaves; the others have long
green lower leaves and small purple higher leaves. The framework of the
doors, windows, and decorations are in the shape of trumpets, and are of a
brownish-red color. White glass (?) and curtains or shades of a turquoise-
blue. The railings of the roof are yellow, with blue tips.
Fig. 14. Martian landscape. Sky of yellow; green lake; gray shores bordered by a
brown fence; bell-towers on the shore, in yellow-brown tones, with corners
and pinnacles ornamented with pink and blue balls; hill of red rocks, with
vegetation of a rather dark green interspersed with rose, purple, and white
spots (flowers); buildings at the base constructed of brick-red lattice-work;
edges and corners terminating in brown-red trumpets; immense white
window-panes, with turquoise-blue curtains; roofs furnished with yellow-
brown bell-turrets, brick-red battlements, or with green and red plants (like
those of Astané’s house,Fig. 12). Persons with large white head-dresses and
red or brown robes.
Fig. 18. Astané’s ugly beast. The body and tail are rose-colored; the eye is green
with a black centre; the head is blackish; the lateral appendices are
brownish-yellow, covered, like the whole body, with pink hair.
Fig. 11. Astané. Yellow complexion, brown hair; brown sandals; roll
of white paper in his hand; variegated costume, or red and
white; brick-red belt and border.Fig. 19. Martian lamp, standing
against a rose and blue-colored tapestry.
Fig. 10. Flying-machine held by Astané, emitting yellow and red flames. [From
the collection of M. Lemaître.]
Fig. 20. Plant of Martian design. Fire-red
flowers; violet-gray leaves.
Now one of the walls is raised, like the curtain of a theatre, and
Hélène sees a magnificent hall adorned with luminous globes,
flowers, and plants, with the ceiling painted in pink clouds on a pink
sky, with couches and pillows suspended along the walls. Then an
orchestra of ten musicians arrive, carrying a kind of gilded funnel
about five feet in height, with a round cover to the large opening,
and at the neck a kind of rake, on which they placed their fingers.
Hélène hears music like that made by flutes and sees every one
moving; they arrange themselves by fours, make passes and
gestures, then reunite in groups of eight. They glide about gently,
for it could not be called dancing. They do not clasp each other’s
waists, but place their hands on each other’s shoulders, standing
some distance apart. It is terribly warm. It is “boiling hot.” They
stop, walk, talk, and it is then that Hélène hears a tall young
brunette (Matêmi) and a short young man (Siké) exchange the first
words of text No. 20. Then they depart in the direction of a large
bush with red flowers (tamiche) and are soon followed by Ramié and
his companion.
At this moment the vision, which has lasted an hour and a quarter,
passes away. Hélène, who had remained standing during the whole
description, now enters into complete somnambulism, and Astané
causes her to write Martian phrases which she had heard and
repeated a short time before. During the entire vision Leopold
occupied her left hand, which was hanging anæsthetically down her
body, and replied by his index-finger to the questions which I asked
in a low voice. I thus learned that this Martian scene was not a
wedding, or any special ceremony, but a simple family fête; that it
was no recollection or product of Hélène’s imagination but a reality
actually passing on Mars: that it was not Leopold but Astané who
furnished this vision and caused her to hear the music: that Leopold
himself neither saw nor heard anything of it all, yet knows all that
Mlle. Smith sees and hears, etc.
This résumé of a family fête, presided over by Astané, gives the
measure of the originality of the people of Mars. The visions relating
to other incidents are of the same order: read the description of the
Martian nursery (text 36), of the voyage in a miza a sort of
automobile, the mechanism of which is entirely unknown to us (text
23), of the operation of chirurgery (text 29), of the games of the
little Anini (p. 176, etc.). We see always the same general mixture of
imitation of things which transpire among us, and of infantile
modifications of them in the minute details.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookball.com