The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
New flexible network environments emerged in the last years, such as the Software-Defined Networks, the Network Function Virtualization and the various network slicing technologies. Their main goal is to satisfy and to flexibly cope with the changing requirements of both users and service / infrastructure providers with respect to the constraints of physical resources, the frequently changing network...
Nowadays, network operators' amenities are populated with a huge amount of proprietary hardware devices for carrying out their core tasks. In this context, industry and academia have turned an eye to virtualization techniques to mitigate those effects and maximize potential earnings. Network Function Virtualization (NFV) aims to transform future network architectures by exploiting standard IT virtualization...
In this paper, we present CLOUDRUNNER, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CLOUDRUNNER automatically creates and configures virtual machines so that they can execute the applications,...
As cloud computing becomes more emerging technology, there is increasing attention being paid to the energy consumption pattern across the entire information and communication technology (ICT) sector. With advent of cloud computing, computing functions and storage processing are migrating to remote resources like virtual servers stored in systems which are mostly hosted in the data centers located...
Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are...
Cloud computing increases the level of connectivity between software applications. IT management applications delivered as a service may need to connect to tens of thousands of endpoint systems. In order to validate the application's reliability and performance at these very large scales, its scalability needs to be tested before being deployed in the cloud. We use an emulation approach, whereby endpoints...
IT-based services existing today, such as the ones supporting e-commerce systems or corporate applications, demand complex architectures to address enterprise-class requirements (high availability, vast user demand, etc.). In particular, most enterprise-class applications are multi-tiered and multi-node, i.e. composed of many independent systems with complex relationships among them. In recent years,...
Web Service Data Forwarding (WSDF) is a framework for centralized web service workflow, in which the intermediate result from a previous service is treated as a resource of the composite service and can be directly used by its subsequent service, without sending back to the centralized control centre. We carried out a test of the WSDF framework within a web service workflow, in which the service providers...
Cloud based online storage enables the storage of massive data. In these systems, a full text search engine is very important for finding documents. In this paper, we propose a distributed search engine suitable for searching a cloud. In our previous work, we developed a distributed search engine, the cooperative search engine (CSE). We now extend the CSE to search clouds. In a cloud, elasticity and...
Server, storage, and network virtualization and the growing adoption of cloud computing has expanded both the complexity and the value of intelligent allocation and management of data center resources. Resource allocation in a cloud environment is of fundamental importance. There are many competing goals, with differing priorities, that contribute to optimizing virtual resource allocation and placement...
In recent years, cloud computing sweeps the world and becomes the new direction for future network applications. The traditional operating systems lack constructivity and evolvability, support less for the application perception and multi-core platform so that they cannot satisfy the requirements of cloud computing applications well. So the development of next-generation cloud-oriented network operating...
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their applications and data. However, as the VMs from different...
Web based learning has grown particularly rapidly in the area of virtual experiment, while automatic marking of virtual experiment is still difficult. One reason is the semantic rule used in marking of virtual experiment. The other is the bottleneck of performance when used by a large amount of user. This paper proposes a complete solution for automatic marking of virtual experiment based on rules...
Recent economic/financial crisis has posed great difficulties for SMEs in the business operations, making them more cautions in IT investment. In this paper we present an innovative service delivery mechanism by lowering the cost of ownership of IT functions provided by software vendors. For each SME in this service delivery mechanism, a virtual machine instance is dynamically maintained on the computer...
Since the virtual network traffic is invisible outside the hypervisor, it is impossible for traditional network-base security devices to harness the attacks happened in virtual computing environment. Industry and academies adopt the network security enabled hypervisor (NSE-H) to protect virtual machines (VM) residing in the virtual network. In this paper, we identified the insufficiency of the existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.