The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The architectures of large-scale Internet servers are becoming more complex each year in order to store and process a large amount of Internet data (Big Data) as efficiently as possible. One of the consequences of this continually growing complexity is that individual servers consume a significant amount of data even when they are idle. In this paper we experimentally investigate the scope and usefulness...
Due to its high bandwidth, good maintainability and flexibility, Gigabit Ethernet is confoundedly suitable for high-performance server applications. As an interface between network and host, Ethernet controller has been continually evolving to meet the ever increasing communication demands being placed on it by enterprise applications. For the Ethernet, network links and physical devices, such as...
The Internet of Things means a connected world. When reaching the industrial level, the automation equipment present a large life cycle and the systems are many times conceived using proprietary protocols. Bringing interoperability to local automation is often a difficult task and changes in the functional structures, particularly in the case of critical infrastructures like the water industry, have...
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Particulate matter pollution becomes an increasingly important problem in developing countries and poses a hazard to human health especially in indoor environment. At the same time, modern buildings are equipped with advanced sensing and control technologies, offering control and optimization capabilities over a large range of parameters. This paper proposes an open platform of a WiFi-enabled indoor...
Big data term refers to different variations of large datasets to complex to be processed by traditional computing methods. The paper presents a system for retrieving images in relational databases in a distributed environment. Content of the query image and images in the database is compared using global color information and local image keypoints. Image keypoints are indexed by fuzzy sets directly...
Network Functions (NFs) are deployed in networks for a variety of purposes, e.g. monitoring, security, or performance optimization. During packet processing, NF maintains the states of processed packets and/or manipulates packets based on these states. Some of these states are per-flow states while others are multi-flow states. With the emerging of network function virtualization (NFV), it is common...
In this paper, we investigate the service capacity of a software-defined network with network function virtualization and service chaining. To obtain and achieve the service capacity, we formulate a mixed integer linear programming problem to jointly optimize the placement of virtual machines and the steering of network flows. In addition, we propose the greedy linear programming relaxation algorithm...
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
Providing the optimal configuration for a software router poses a lot of technical challenges that do not present in the dedicated hardware router. One of them is how to characterize performance varying due to different configurations on commodity hardware. This paper addresses the problem of configuring a software router that provides the minimum of average packet latency. Since changing all combinations...
Network Function Virtualization promises to reduce the overall operational and capital expenses experienced by the network operators. Running multiple network functions on top of a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware and reduce the maintenance and management costs. However, total cost of ownership calculations are typically a...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Uptime is very important with any computer system, because a solution which is not available cannot be relied upon to provide accurate information in a timely and routine manner — usually resulting in the loss of time, revenue, or data. Highly-available systems and websites rely on eliminating single points of failure, and on reacting quickly to any network, hardware or software issues which may occur...
Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification...
Today's data center servers are equipped with high speed and complex network adaptors, featuring an array of functions, e.g. hardware TX/RX queues, packet filters, rate limiters, etc. Recent work like IX, Arrakis, MultiStack has made us rekindle the user-level network stacks' innovation utilizing these commodity network adaptors. In this paper, we revisit the idea to move stacks' design from in-kernel...
In this work we analyze the complex trade-off between data transfer, computation time, and power consumption when a multi-stage data-intensive algorithm (in this case video stabilization) is split between a low power mobile device and high power cloud server. We evaluate design choices in terms of which intermediate representations should be transferred to the server and back to the mobile device,...
In this paper, the design, construction, and testing of a fully-functional virtualised mobile core network is outlined. Lessons learned and recommendations for future improvements are provided. The presented work uses open-source software for virtual network function infrastructure control (OpenStack), network flow programming (OpenDaylight), and network orchestration (OpenBaton) to virtualise a commercial...
This paper presents the cloud infrastructure of the AEGLE project, that targets to integrate cloud technologies together with heterogeneous reconfigurable computing in large scale healthcare systems for Big Bio-Data analytics. AEGLEs engineering concept brings together the hot big-data engines with emerging acceleration technologies, putting the basis for personalized and integrated health-care services,...
Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). Given the continuous distribution of IoT devices, data confidentiality and user privacy are of utmost importance. However, with the growing complexity of SoCs, the risk of malware infections and trojans introduced at design time increases significantly. A vital threat to system security are so-called...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.