The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In MapReduce, the parallel processing performance is often limited by only a few compute nodes that delay to complete given tasks. Although various techniques have been invented to handle such stragglers, these techniques mostly impose a burden on master node to monitor the progress of all the compute nodes, resulting in a new bottleneck as the number of compute nodes increases. As an alternative...
In this paper we introduce the SDNRoute system which aims to support routing decisions in Software Defined Networks. Such a system is especially important in the context of the SDN as this concept makes it possible to perform routing in a dynamic and elastic manner. We focus on the SDNRoute architecture and research challenges that must be investigated to develop the system. Additionally, we provide...
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way....
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage and control network traffic. However, SDN will experience long packet delay and high packet loss rate when the communication link between two planes is jammed by SDN-aimed DoS attacks with massive table-miss packets. In this paper, we propose FloodDefender, an...
This paper proposes a technique for reducing power consumption and increasing pipeline performance using the state of art “Better than worst case” design. This method uses a violation predication mechanism that places the optimum number of Transition Detectors and a novel Time Borrowing technique to prevent potential timing errors. In this work the tradeoff between power consumption (Transition Detectors...
Junction temperature is a critical indicator for health condition monitoring of power devices. Concerning the reliability of emerging silicon carbide (SiC) power semiconductors due to immaturity of new material and packaging, junction temperature measurement becomes more significant and challenging, since SiC devices have low on-state resistance, fast switching speed, and high susceptibility to noise...
Nowadays, monitoring per-flow metrics, such as throughput and delay, in OpenFlow networks represents an important input to implement traffic engineering approaches. Per-flow monitoring mechanisms require to uniquely identify the complete network path followed by all the packets of the corresponding flow. For example, in order to measure path delay, monitoring mechanisms regularly inject probe packets...
Power saving is the major issue in the present scenario of 4th generation (4G) Long Term Evolution (LTE) wireless communication. The usage of User Equipment (UE) for the real time applications in LTE network causes an excessive power consumption. The real time application that deals with high data rate processing in the UE drains the battery power quickly. The Discontinuous Reception (DRX) mechanisms...
In this paper we present an autonomous wide band adaptive interference canceller solution that alleviates the problem of performance degradation of an electronic support system (ESS) operating in a high interference RF environment. The interference canceller improves the sensitivity and dynamic range of a complex receiver to allow the detection of signals of interest that are dominated by local high...
This paper summarizes the recent changes to the hardware and software systems associated with the diagnostic digitizer triggers and their data acquisition control program at the Saturn pulsed power facility at Sandia National Laboratories. The main screen room contains approximately 70 digitizing scopes for monitoring 6 voltage or current probes along each of its 36 energy storage and transmission...
Multicore systems are being increasingly used for embedded system deployments, even in safety-critical domains. Co-hosting applications of different criticality levels in the same platform requires sufficient isolation among them, which has given rise to the mixed-criticality scheduling problem and several recently proposed policies. Such policies typically employ runtime mechanisms to monitor task...
Scalable and automated monitoring processes for testing, debugging, and operation of VNFs and service-chains are crucial components towards achieving the aims of network softwarization - i.e., cheaper, faster, and shorter service deployment and network management processes. In this paper we present a decentralized monitoring approach aimed at supporting automated deployment and operation of VNFs and...
Software Defined Networking is a promising Internet architecture to deliver multimedia with end-to-end quality of service (QoS) since it enables optimal dynamic management of network resources and on-demand QoS provisioning by a network operator. We propose a framework for server load-balancing over a single-operator OpenFlow network to improve the quality of service levels of video streaming services...
Wireless Sensor Networks (WSNs) have gained wide-scale popularity for real-time events monitoring and detection due to their high accuracy and ease of deployment. Therefore, they have become increasingly prevalent solutions in several application domains such as health-care, transportation, etc. Many studies in the literature have focused on optimizing the energy consumption of the wireless sensors...
Cognitive Radio Network (CRN) enables secondary users to borrow unused spectrum from the proprietary users in a dynamic and opportunistic manner. However, dynamic and open access nature of available spectrum brings a serious challenge of sustenance amongst CRNs which makes them vulnerable to various spectrum etiquette attacks. Jamming-based denial of service (DoS) attack poses serious threats to legitimate...
The paper presents an evolutionary method based on genetic programming (GP) for synthesizing of a monitor alarm system for the railway control traffic unit. Automatic supervision of railway traffic control is a very important and complex task. A wrong control signal can lead to very serious incidents or accidents. A well-designed monitoring system can prevent these accidents by a simple alarm which...
Software Defined Networking (SDN) and OpenFlow represent the most commonly deployed approaches of the so called Programmable Networks. SDN is an emerging network architecture, which performs the subdivision of control plane and data plane and allows greater speed, greater scalability, and greater ductility in terms of routing and forwarding. OpenFlow, instead, is an SDN component that characterizes...
The decentralized electrification of isolated sites with photovoltaic (PV) present difficulties in monitoring and remote control if a problem occurs or system malfunction. This requires energy management, supervision and remote intervention. In this paper, we present the results concerning the functioning of a system of energy management (IT kit), designed and implemented in this work that is based...
We propose a simple scheme for detecting selfish behavior achieved by manipulating the 802.11 Medium Access Control (MAC) protocol. Specifically, attacks that exploit the Distributed Coordination Function (DCF) parameters and data rate adaption scheme to maximize individual throughput pose a denial of service threat against protocol abiding nodes. We detect this malicious behavior by employing a combination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.