The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud database management systems (DBMSs) often decouple database instances from physical storage to provide reliability and high availability to users. This design can robustly handle a single point of failure, but needs substantial effort to attain good performance. In this paper, we analyze the decoupled architecture and present important optimization issues that we faced in implementing the design...
Network function virtualization enables flexible implementation of network functions, or middleboxes, as virtual machines running on standard servers. However, the flexibility also creates a challenge for efficiently placing such middleboxes, due to the availability of multiple hosting servers, capability of middleboxes to change traffic volumes, and dependency between middleboxes. In this paper,...
This paper presents a case study of an application prototype for shipbuilding industry using RESTful web service. Majority of database applications for traditional enterprises are based on the two-tier with simple client-server or the three-tier with additional RPC middleware. Because the outdated old configuration is not extensible, an alternative is required to link the database to the Web or mobile...
Content Delivery Networks (CDN) interconnect several surrogate a.k.a replica servers that use geographical proximity as a criteria for delivering multimedia content. The delivered content may be enriched by value-added video services (e.g. in-stream video advertisements). The purpose of this demo is to show the prototype we developed in order to enable a cost-efficient and agile provisioning of value-added...
Due to security situation in Afghanistan traditional paper-based libraries are vulnerable to preserve Afghan knowledge and culture heritage. This paper proposes a robust library management system namely "e-Ketabtoon". The architectural landscape is comprised of two layers: server responsiveness capacity and client request capacity. User centered design has been adhered throughout the development...
The need to perform data analytics on exploding data volumes coupled with the rapidly changing workloads in cloud computing places great pressure on data-center servers. To improve hardware resource utilization across servers within a rack, we propose Direct Extension of On-chip Interconnects (DEOI), a high-performance and efficient architecture for remote resource access among server nodes. DEOI...
This paper proposes an architecture that can optimize inter-VM communication in an NFV environment through the creation of direct channels between virtual machines. Particularly, our prototype can transparently optimize the data transfer between virtual machines running DPDK applications by dynamically recognizing the existence of point-to-point connections in the traffic steering rules, reverting...
Interaction and visualization are two significant methods for both business people and scientists to find “gold nuggets” buried in raw data. These two methods can simplify complex theories and make it easier for people from different research areas to cooperate. Many prevalent web-based data interaction and visualization tools and libraries are not as effective as before because of big data. Most...
Maintaining situational awareness in dynamic and complex systems, such as information and communications networks, is essential to protecting assets and increasing mission assurance. Network monitoring tools generate tremendous amounts of data, overwhelming network defenders with alerts.
NanoStreams explores the design, implementation, and system software stack of micro-servers aimed at processing data in-situ and in real time. These micro-servers can serve the emerging Edge computing ecosystem, namely the provisioning of advanced computational, storage, and networking capability near data sources to achieve both low latency event processing and high throughput analytical processing,...
Uploading of huge files to cloud servers through mobile communication has been becoming more popular in recent years. However, current uploading throughput is frequently limited due to bottlenecks in server processing ability and/or narrow bandwidth sections of networks. For this study, we aimed to improve the user experience of uploading in future wireless access environments. We propose a novel...
HP ne ver shied away from big names for its computers. There are high-performance servers named Apollo and optimized computing systems called Moonshot. And then there's The Machine. When Hewlett-Packard Co.-now split in two- announced The Machine in Las Vegas in 2014, it presented the project as a near-complete overhaul of traditional computer architecture. Gone were the CPU-centric architecture,...
Highly available metadata services of distributed file systems are essential to cloud applications. However, existing highly available metadata designs lack client-oriented features that treat metadata discriminately, leading to a single metadata fault domain and low availability. After investigating the workload characteristics of Hadoop, we propose Client-Oriented METadata (COMET), a novel highly...
Agile cost management provides simple steps or process compared to the traditional cost management. Since, most of the companies are using Agile method in their development project, agile cost management becomes more significant to look into because the way people manage a cost can be more effective and efficient. Therefore, this paper proposed the prototype development of Agile Cost Management Tool...
The NSF EPSCOR funded Solar Nexus Project is a collaborative effort between scientists, engineers, educators, and technicians to increase the amount of renewable solar energy in Nevada while eliminating its adverse effects on the surrounding environment and wildlife, and minimizing water consumption. The project seeks to research multiple areas, including water usage at power plants, the effect of...
We present an architecture that increases persistence and reliability of automated infrastructure management in the context of hybrid, cluster-cloud environments. We describe our highly available implementation that builds upon Chef configuration management system and infrastructure-as-a-service cloud resources from Amazon Web Services. We summarize our experience with managing a 20-node Linux cluster...
Despite research spanning more than a decade in the area of Web services, the industry has not yet seen a consensus regarding an effective method for the provisioning of Web services. In recent years, a new paradigm for implementing Web services based on Representational State Transfer, the successful architectural foundation of the Web, has seen greater interest in the industry. We had previously...
The paper presents application of SIP protocol in the context of bag-of-tasks grid architecture. The SIP protocol has been used in realization of the execution management service. The main idea is use of stateful SIP proxy as request broker. The paper provides description of the concept, and the prototype system that has been built, as well as calculation of estimated performance level and it's relation...
Over the last few years, MapReduce systems has become popular for processing large-scale data sets and are increasingly being used in web indexing, data mining, and machine learning. Unlike simple application scenarios such as word count, many applications of MapReduce exhibit strong skewed access patterns in real production environment, the data access is non-uniform, often only a small portion of...
Security of sensitive data in the cloud is a critical issue as they can easily be transferred between different locations and then violate some constraints such as country-based regulations. There is notably a specific need to control the path followed by the data when they are transferred within the cloud. This paper is then presenting a new approach using OpenFlow and allowing to enforce in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.