The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional storage virtualization systems are faced with the problem of poor storage utilizations, leading to expensive capital expenditures and high energy consumptions. To address this issue, we design and implement Thin Store, an out-of-band virtualization system that supports thin provisioning of storage resources. Thin Store automatically allocates storage capacity only when new data is written...
Virtual machines are allocated on demand in virtualized cloud platforms to provide flexible and reliable services. The major difficulty lies in satisfying the conflicting objectives of reducing response time while lowering resource costs. In this paper, a mathematical multi-tier framework for virtual machine allocation is proposed, which can be used to capture the performance of the cloud platform...
Concurrent applications in virtualized environments (VE) encounter synchronization problems such as Lock Holder Preemption (LHP). Hybrid co-scheduling is an effective approach to address such problems. However, the contention and exclusiveness between multiple concurrent domains in hybrid co-scheduling cause a serious performance degradation and unfairness. To keep the benefits brought by hybrid co-scheduling...
IPv4 addresses are already depleted in IANA and will be soon exhausted in RIR while more clients are pouring into the Internet. IPv6, as the only available next generation Internet protocol, is still not commercially successful because a scheme that could solve the migration of IPv4 resources to IPv6 network, as well as mutual communication between the two incompatible protocols, has not been fully...
The technology acceptance model (TAM) proposes that perceived usefulness and perceived ease of use can predict that whether an information technology will be accepted and used by people. In this research, we were trying to find out dominant factors which could be predictors to the usage of privacy setting tools on Social Networking Sites (SNS) based on TAM. We used a modified TAM to take usefulness...
The network community always pays its attention to find better methods for traffic classification, which is crucial for Internet Service Providers (ISPs) to provide better QoS for users. Prior works on traffic classification mainly focus their attentions on dividing Internet traffic into different categories based on application layer protocols (such as HTTP, Bit Torrent etc.). Making traffic classification...
Request balancing is an important issue in P2P networks, as requests or accesses are typically not distributed evenly among the items. Some of the items may account for a large ratio of the overall requests, e.g., in case of extremely popular videos. In this paper, we present a combination of two approaches to overcome an uneven request distribution even if there is highly skewed traffic. These approaches,...
The inherently unreliable communication infrastructure compel WSN protocols to employ error control mechanisms. Traditionally, error control is achieved by a retransmission scheme using acknowledgment mechanisms. WSN architectures are severely resource constrained and the additional energy expense of transmitting error control messages can seriously degrade network lifetime. In this paper, we analyze...
Nowadays, real time traffic over wireless networks is increasing sharply. In addition, network scale is larger due to new facilities as offered by wireless mesh networks. However, the differences between (1) the infrastructure capacities, (2) the end users devices technologies, (3) the number of users, and (4) the number of real time applications are implying the need of more dynamic quality of service...
We consider the allocation of Virtual Arrays (VAs)with different RAID levels in a Heterogeneous Disk Array (HDA). This is expected to provide significant cost savings by consolidating multiple disk arrays into one. Disk load balancing across disk arrays is a by-product of HDA. We provide an example of potential performance benefits expected from HDA. The number of Virtual Disks (VDs) required to materialize...
We consider a two level Hierarchical RAID: RAID with MDS erasure coding, so that it tolerates knode and disk failures per node with the minimum redundancy level. With no controller failures HRAID tolerates all disk failures, while the maximum number of disk failures tolerated in an array with k nodes and k disks per node is $/math/$. We vary RAID controller failure rates...
The RAID-6 architecture is playing an increasingly important role in modern storage systems. There are generally two kinds of RAID-6 codes, horizontal codes and vertical codes. Horizontal codes have been extensively studied and widely implemented, while vertical codes have not gained the equal attention. In this paper, we investigate the state-of-the-art horizontal and vertical RAID-6 codes and select...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.