The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: cloud computing; resource management; P2P networks; distributed storage; delay assurance; data security; wireless networks; QoS routing; TCP; and service management.
The passive estimation of Internet access capacity is interesting both from a scientific perspective, because it requires the development of techniques and tools to extract such a capacity from a noisy set of traffic measurements; and from an industrial perspective, because it supports, in principle, the possibility to measure the Service Levels of IP Access Service offered by Internet service providers...
Despite the significant body of research that has been conducted on quality of service (QoS), the notion of a dominant approach to end-to-end (E2E) QoS remains elusive. Beyond the ever present issue of deployment, the complexity and limited speed of resource negotiation arising from per-hop or per-domain interactions limit the general utility of the existing approaches. In this paper, we propose a...
The system capacity available to a multi-tier Web based application is often a dynamic quantity. Most static threshold-based overload control mechanisms are best suited to situations where the system's capacity is constant or the bottleneck resource is known. However, with varying capacity, the admission control mechanism needs to adapt dynamically. We propose and implement an adaptive admission control...
In the recent years, a progressively growing number of computing and communication services have undertaken the migration from their conventional media to the new unified platform, IP networks. As a consequence, business success of service providers becomes largely determined by the effectiveness of their service management schemes, which require rapid identification of problems and resolution of...
A mobile sensor is used to cover a number of points of interest (PoIs) where dynamic events appear and disappear according to given random processes. It has been shown in that for Step and Exponential utility functions, the quality of monitoring (QoM), i.e., the fraction of information captured about all events, increases as the speed of the sensor increases. This work, however, does not consider...
Recent deployment of IP based multimedia distribution, especially broadcast TV distribution has increased the importance of simple and fast restoration during IP network failures for service providers. In this paper, we propose and evaluate a simple but efficient method for fast rerouting of IP multicast traffic during link failures in managed IPTV networks. More specifically, we devise an algorithm...
In standard IEEE 802.11 based systems, when the wireless client migrates away from the radio range of the currently associated access point (AP), network applications temporarily loose connectivity till the client is able to re-associate itself with a new AP. The delay that occurs during the break-off interval can vary from a few hundreds of microseconds to a few seconds. However, delay sensitive...
Many efforts have been devoted to maximizing network throughput in a multi-channel multi-radio wireless mesh network. Current solutions are based on either pure static or pure dynamic channel allocation approaches. In this paper, we propose a hybrid multi-channel multi-radio wireless mesh networking architecture, where each mesh node has both static and dynamic interfaces. We first present an Adaptive...
Priority queues are an essential building block for implementing advanced per-flow service disciplines at high-speed network links. In this paper, we propose novel solutions to the scalable implementation of priority queues by decomposing the problem into two parts, a succinct priority index in SRAM that can efficiently maintain a real-time sorting of priorities, coupled with a DRAM-based implementation...
Low-rate denial of quality (DoQ) attacks, by sending intermittent bursts of requests, can severely degrade the quality of Internet services and evade detection. In this paper, we generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results for a Web server with feedback-based admission control. First, we model the Web server under the attack as a switched...
There is a growing interest in using wireless sensor networks for security monitoring in the underground coal mines. In such applications, the sensor nodes are deployed to detect interested events, e.g., the density of certain gas at some locations is higher than the predefined threshold. These events are then reported to the base station outside. Using conventional multi-hop routing for data reporting,...
We address the following question in this study: Can a network application detect not only the occurrence, but also the location of congestion? Answering this question will not only help the diagnostic of network failure and monitor server's QoS, but also help developers to engineer transport protocols with more desirable congestion avoidance behavior. The paper answers this question through new analytic...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however,...
The distributed rate limiting (DRL) paradigm is a recently proposed mechanism for decentralized control of cloud-based services. DRL is a simple and efficient approach to resolve the issues of pricing and resource control/engineering of cloud based services. The existing DRL schemes focus on very specific performance metrics (such as loss rate and fair-share) and their design heavily depends on the...
With the phenomenal growth of wireless networks and applications, it is increasingly important to deliver content efficiently and reliably over wireless links. However, wireless performance is still far from satisfactory due to limited wireless spectrum, inherent lossy wireless medium, and imperfect packet scheduling. While significant research has been done to improve wireless performance, much of...
Today's data centers face two critical challenges. First, various customers need to be assured by meeting their required service-level agreements such as response time and throughput. Second, server power consumption must be controlled in order to avoid failures caused by power capacity overload or system overheating due to increasing high server density. However, existing work controls power and...
Information-driven networks include a large category of networking systems, where network nodes are aware of information delivered and thus can not only forward data packets but may also perform information processing. In many situations, the quality of service (QoS) in information-driven networks is provisioned with the redundancy in information. Traditional performance models generally adopt evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.