The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there is a rapid growth in the internet services which has increased incoming traffic in the network and also plays a vital role in increasing the size of the cluster server. The load balancing is a key technology to manage the traffic efficiently. In this paper, we propose an alternative load balancing architecture using OpenFlow switches which are connected to the controller. This...
Multipath TCP (MPTCP) brings promising features of throughput improvement and load balancing by utilizing the multiple available paths. However, adding a subflow without awareness of the network state will result in wasting network resources and degrading MPTCP performance. Finding and operating the proper number of subflows are necessary to achieve the best performance of MPTCP. However, an MPTCP...
In current Data Center Networks (DCNs), Equal- Cost MultiPath (ECMP) is used as the de-facto routing protocol. However, ECMP does not differentiate between short and long flows, the two main categories of flows depending on their duration (lifetime). This issue causes hot-spots in the network, affecting negatively the Flow Completion Time (FCT) and the throughput, the two key performance metrics in...
The proliferation of smartphones has unleashed a tremendous growth in wireless traffic, which is projected to continue for the foreseeable future, and put yet greater strain on the capacity of cellular networks. Deployment of pico base stations, reducing cell sizes and allowing more efficient reuse of limited radio spectrum, provides a powerful approach to cope with traffic hot spots and bring capacity...
In this paper, we evaluate the performance of per-packet load balancing in data center networks (DCNs). Throughput and flow completion time are considered among the main metrics to evaluate the performance of the transport of flows over the presence of long flows in a DCN. Load balancing in a DCN may benefit those performance metrics but also it may generate out-of-order packet delivery. We investigate...
Cloud Computing is a major area of research. Cost and Load balancing has become an important QoS parameter. Load Balancing directly affects the Reliability, Response Time, Throughput and Energy Efficiency of a Server. A good Load Balanced architecture implies minimized overall time, less server failure, minimized response time, increased throughput and less wastage of energy. Such architecture also...
In spite of the fact that Cloud Computing Environments (CCE) host many I/O intensive applications such as Web services, big data and virtual desktops, virtual machine monitors like Xen impose high overhead on CCEs' delivered performance hosting such applications. Studies have shown that hypervisors such as Xen favor compute intensive workloads while their performance for I/O intensive tasks is far...
The era of cloud based multimedia applications has lead to a huge increase in the no. of requests on cloud. The increased no. of requests on cloud leads to an increased workload, making workload balancing an important QoS Parameter. Workload Balancing also leads to a judicious use of resources like electricity etc. and thus promotes the concept of Green IT. The paper presents a new Load Balanced Resource...
Distributed Denial of Service (DoS) attacks is one of the major threats and among the hardest security problems in the Internet world. In this paper, we study the impact of a UDP flood attack on TCP throughputs, round-trip time, and CPU utilization on the latest version of Windows and Linux platforms, namely, Windows Server 2012 and Linux Ubuntu 13. This paper also evaluates several defense mechanisms...
In a distributed system, there is always a question of how to distribute any data across the constituent systems. Consistent hashing is often used to get this system mapping based on a hash function and the data. Hence it becomes solely responsible for the distribution of the workload across the different systems. The default consistent hashing partitioning scheme doesn't factor in the load distribution...
The cloud computing provides better management and utilization of underlying infrastructures with resource virtualization. However, most of existing load balance models are unable to meet the special requirements of business such as the imbalance of peak period, the impact of nonlinear cross between varieties of business. Thus the reliability, scalability and self-organization of service becomes a...
In distributed query processing systems where caching infrastructure is distributed and scales with the number of servers, it is becoming more important to orchestrate and leverage a large number of cached objects in distributed caching systems seamlessly as the present trend is to build large scalable distributed systems by connecting small heterogeneous machines. With a large scale distributed caching...
To accommodate the increasing presence of intermittent renewable energy sources in power generation, electricity providers offer incentives for demand response so as to stabilize the grid load. This paper argues that data centers have the ability to provide large capacity reserves to emerging smart grid programs, and thus, provide opportunities for sustainable data center growth and cost savings as...
Widespread use of SIP as a signalling protocol in VoIP networks is the main reason for tackling various challenges. SIP throughput can severely be degraded when an overload situation happens in the proxy servers due to several retransmissions from user agents. In this paper we try to prevent throughput reduction by properly distributing the loads over available proxy servers. The proposed scheme utilizes...
As modern large scale systems are built with a large number of independent small servers, it is becoming more important to orchestrate and leverage a large number of distributed buffer cache memory seamlessly. Several previous studies showed that with large scale distributed caching facilities, traditional resource scheduling policies often fail to exhibit high cache hit ratio and to achieve good...
A scale-out and reliable object store is an important building block of a cloud service, for storing virtual machine images, backups and large application data. As such an object store, Amazon S3 is available for Amazon EC2 users and other S3-compatible storage systems are also used in private clouds. However, there is concern about performance instability when many applications concurrently access...
Cloud computing aims at providing services on the basis of a shared pool of underpinning resources and load balancing is of paramount importance in such an environment. At the same time, multi-tenancy is widely adopted in cloud computing to reduce the costs of service provisioning and to improve resource utilization. Multi-tenancy brings new challenges to load balancing, since it incurs resource competition...
Cloud Computing is one of the latest computing paradigms in IT sector today where applications, platforms, software and some other IT services are provided over the internet. It is also known as On Demand Computing. Cloud Computing considers shared pool of configurable computing resources which requires proper resource distribution among the tasks, otherwise in some situations resources may over-utilized...
We propose a method for dynamic load balancing in wireless LANs (WLANs), which adapts association topology dynamically based on traffic conditions, while keeping the handoff overhead negligible using virtualized wireless network interfaces (WNICs). In large-scale WLANs, there are many locations that each station (STA) can discover multiple access points (APs). In these locations, the conventional...
In this article, we analyze and compare different data center environments in terms of the maximal throughput they offer to end nodes. In particular, we examine to which extent balancing can increase the throughput guaranteed for an arbitrary traffic pattern. We consider and compare two-phase balancing algorithms which are optimized assuming different underlying routing algorithms. It will be shown...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.