The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High performance, scalable, and fault-tolerant application services can be provided by balancing processing load among virtual machines to perform application processes in server cluster systems. On the other hand, a large amount of electric energy is consumed in a server cluster system since multiple virtual machines are performed on multiple servers which consume electric energy to perform application...
In infrastructureless networks like P2P networks and mobile ad hoc networks, a pair of nodes are not always supported with reliable and efficient communication. For example, some relay nodes may be faulty and a communication link between some pair of neighboring nodes may be degraded in QoS due to noise. In this paper, we propose a parallel transmission protocol for reliably and efficiently transmitting...
It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems including a huge number of servers like cluster computing systems. Types of application processes like computation, storage, and communication processes are performed on servers in clusters. In clusters, most applications use not only CPU resources but also storage drives like database and web...
Application processes have to be efficiently performed in presence of server faults in a cluster. Replicas of a process are performed on multiple servers to be tolerant of server faults. However, the more number of replicas of a process are performed, the more reliably and available the process can be performed but the more amount of electric energy is consumed by servers. In this paper, we take a...
In information systems, illegal information flow among objects has to be prevented. A transaction illegally reads an object if the object includes data in other objects which are not allowed to be read. In our previous studies, the flexible read-write-abortion with role sensitivity (FRWA-R) and object sensitivity (FRWA-O) protocols are discussed to prevent illegal information flow. Here, a transaction...
In this paper, we use Hill Climbing algorithm for mesh router node placement in WMNs. We evaluate the performance of the system considering different distribution of mesh clients and using giant component and number of covered mesh clients metrics. We compare the performance of the system for Normal, Uniform, Exponential and Weibull distribution of mesh clients. The simulation results show that the...
It is critical to reduce the electric power consumed by servers in a cluster in order to realize eco society. In our previous studies, the multi-level power consumption (MLPC) model of a server with a multi-thread CPU, the power consumption of the server is proposed and the globally energy-aware (GEA) algorithm is discussed to select a server for each process in a cluster. Here, not only the total...
A peer-to-peer (P2P) system is composed of peer processes (peers) interconnected in overlay networks. A peer has to communicate only with acquaintance peers due to the scalability and autonomy of the P2P system. A peer can collect information on objects distributed in P2P systems through communicating with the acquaintance peers. Peers may hold obsolete information and be faulty. Hence, a peer has...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in location science. In our previous work, we evaluated WMN-GA system which is based on Genetic Algorithms (GAs) to find an optimal location assignment for mesh routers. In this paper,...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
It is significant to deliver messages to every node in a group to realize the cooperation of the nodes in wireless networks. In order to reduce the number of messages in the flooding protocols, the multi-point relay (MPR) protocols are discussed where only relay nodes forward messages and the other leaf nodes do not forward messages. In this paper, we discuss broadcast protocols where the total electric...
Information systems are getting scalable like cloud computing systems and Internet of Things (IoT). It is critical to reduce electric energy consumed in our society. In information systems, we have to reduce the electric energy consumed by computers, especially servers in clusters to perform application processes. Types of application processes like computation, storage, and communication processes...
There are various types of high performance, scalable, and fault-tolerant information systems like cloud systems to realize applications on distributed systems. Virtual machines are used to realize these distributed applications in server cluster systems. In order to satisfy application requirements like deadline constraint for each application process, processing load of virtual machines has to balance...
A distributed system is considered in an eventdriven model where states of processes transit on occurrence of events. In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe (P2PPS) system where each peer process (peer) pi can both subscribe a subscription pi:S and publish an event message e with a publication e:P. The subscriptions and publications are specified in...
There is currently a growing interest on Big Data Stream processing. With the increasing capabilities of Internet-based computing systems to generate, store and process Big Data Streams, various applications are benefiting from the information extracted in real time from data streams. Such families of applications comprise IoT-based monitoring systems, decision making systems, recommendation systems,...
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we evaluate the accuracy of implemented Fuzzy-based system written in C-language (FuzzyC) for CAC. For evaluation,...
It is critical to reduce the electric power consumed by servers in a cluster in order to realize eco society. In the multi-level power consumption (MLPC) model of a server with a multi-core CPU, the power consumption of the server depends on the number of active cores and active threads where at least one application process is performed. In our previous studies, we discuss the energy-aware (EA) selection...
In distributed applications, multiple processes are cooperating with one another by exchanging messages in networks. Information systems like cloud computing systems are getting scalable, which are composed of a huge number of processes. In group communications, messages sent by processes have to be causally delivered to every process in a group. The vector clock is widely used in group communication...
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobility of the terminals, routing is a key process for operation of WMNs. In this paper, we present the implementation of a testbed for WMNs. We analyze the performance of Optimized Link...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.