The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several approaches for fault-tolerance in distributed systems were introduced; however, they require prior knowledge of the environment's operating conditions and/or constant monitoring of these conditions at run time. That allows the applications to adjust the load and redistribute the tasks when failures occur. These techniques work well when there is no high communication delay. Yet, this is not...
Active network measurements play an important role not only in network monitoring for OAM purposes, but also in assessing the current network status and providing real-time information for the optimization of applications. This paper proposes the extension of SNMP-based monitoring mechanisms to also support active in-network measurements conforming to the standardized OWAMP protocol. A specialized...
In this paper, we propose a modification of the observe extension of CoAP to include Quality of Service (QoS) support for timeliness. The proposed QoS support is based on delivery priority. Nodes are able to express the priority order with which they wish to be notified. Furthermore, they are also able to specify which notification they want to receive. We classify the notifications in two categories:...
A complex software system may have hundreds of tuning parameters with both itself and its runtime environments. To perform optimally at runtime, a self-adaptive system often needs to employ a series of controllers to tune different parameters. In most cases, these parameters are not independent but interact with each other, thus demanding effective coordination among different controllers. Due to...
Data replication is a well-known strategy to achieve the availability, scalability and performance improvement goals in the data management world. However, the cost of maintaining several database replicas always strongly consistent is very high. The CAP theorem shows that a shared-data system can choose at most two out of three properties: consistency, availability, and tolerance to partitions....
State monitoring is widely used for detecting critical events and abnormalities of distributed systems. As the scale of such systems grows and the degree of workload consolidation increases in Cloud data centers, node failures and performance interferences, especially transient ones, become the norm rather than the exception. Hence, distributed state monitoring tasks are often exposed to impaired...
Today's competitive business climate and the complexity of IT environments dictate efficient and cost effective service delivery and support of IT services. This is largely achieved through automating of routine maintenance procedures including problem detection, determination and resolution. System monitoring provides effective and reliable means for problem detection. Coupled with automated ticket...
Applications that involve client-server communication sometimes require the execution of asynchronous processes on the server side. We have created a framework for distributed object programming, called Web Objects in XML (WOX), which uses HTTP as transport protocol, XML for object representation, and provides synchronous and asynchronous communication between clients and servers. This paper presents...
To carry out the maintenance and analysis of communication networks, the network maintenance personnel must achieve real-time, accurate collection of signaling data of communication network. But the delay in the actual link signaling data transmission process is inevitable. If not take the delay correction will seriously affect the accuracy of the follow-up signaling message handling. This paper presents...
The delivery of mobile services is traditionally limited to the cellular operator's home domain, except for a small set of standardized services. Due to the centralized nature of service platforms, resource demanding services suffer from long delays if a user is accessing them when roaming. In this paper we describe an architecture that supports a dynamic, distributed service provisioning for mobile...
The energy consumption of ICT infrastructures has increased considerably in the recent years. This has resulted in extensive research on dynamic power management strategies as well as data centre design and placement. The main problem with most of the proposed or existing approaches is that they do not fully take the distributed nature of and strong logical dependencies between executed services into...
It is very difficult to identify the location of bottlenecks when there is deterioration of Quality of Service (QoS) because current Internet service is the complicate structure which is provided through a number of ISP. This paper proposes bottleneck detection algorithm which can detect the bottleneck point easily and efficiently even though there is no prior knowledge of the network connection status...
As the most popular application in Internet, the performance of web applications are drawing more attention of users and Internet service providers. In order to monitor and analyze user perceived web performance in real network of China, a group of web performance parameters are used which can reflect high layer protocol performance directly impacting user feeling when visiting webpages. A distributed...
In this paper, an adaptive and robust monitoring approach for Wireless Sensor/Actuator Network (WSAN) environments is proposed. The main problem under investigation is the monitoring of the status of WSAN devices in an environment where the clocks of the devices are not well synchronized (asynchronous communication). The main contribution is the proposed adaptive virtual timer, for the server node,...
Active Queue Management (AQM) and Explicit Congestion Notification (ECN) are two methods that attempt to alleviate the problems of FIFO queues and of packet drops for congestion indication respectively. Random Early Detection (RED) is the most popular AQM method. The Domain Naming System (DNS) protocol is a core Internet protocol with very high impact on user experience and overall network functionality...
Water vapor is an important kind of greenhouse gas in the atmosphere whose spatial distribution is extremely uneven and time variation is also very fast. It is not only the main driving force of weather and climate change, but also an important formation and evolution reason for disastrous weather, especially meso-small scale disastrous weather. Along with the development of GPS meteorology, people...
A distributed autonomic system adapts its constituent components to a changing environment. This paper reports on the application of autonomic management to a distributed storage service. We developed a simple analytic model which suggested potential benefit from tuning the degree of concurrency used in data retrieval operations, to suit dynamic conditions. We then validated this experimentally by...
As the Session Initiation Protocol (SIP) becomes more and more the core of the communication networks convergence, there is urgent need to manage the critical problem of SIP service availability under extreme overload. This paper proposes a novel solution to control SIP overload. We demonstrate the efficiency of the approach compared with a well known SIP overload control algorithm. The solution builds...
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of being attacked is to identify long connection chains connecting into the host. This paper proposes a novel method to identify long connection chains...
To reduce energy consumption and wastage, effective energy management at home is key and an integral part of the future Smart Grid. In this paper, we present the design and implementation of Green Home Service (GHS) for home energy management. Our approach addresses the key issues of home energy management in Smart Grid: a holistic management solution, improved device manageability, and an enabler...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.