The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In spite of their growing maturity, current web monitoring tools are unable to observe all operating conditions. For example, clients in different geographical locations might get very diverse latencies to the server; the network between client and server might be slow; or third-party servers with external page resources might underperform. Ultimately, only the clients can determine whether a site...
Virtualization technologies allow cloud providers to optimize server utilization and cost by co-locating services in as few servers as possible. Studies have shown how applications in multi-tenant environments are susceptible to systems anomalies such as abnormal resource usage due to performance interference. Effective detection of such anomalies requires techniques that can adapt autonomously with...
Wind-flow around a long-span bridge, as a bluff body, will generate an aerodynamic force that interacts with the flow, causing vibration to the bridge deck. This phenomenon can lead to structural fatigue or worst, the bridge collapse. A continuous and comprehensive measurement system is needed for early detection and maintenance reference of a long-span bridge. Another benefit this system is aiming...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Monitoring is a common requirement in everyday modern life, from anti-virus scanners on personal computers to securing large multinational systems' health and status. Such monitoring is a fundamental process which must be undertaken where resources are offered as a service as in the cloud, to make sure that the service has been delivered to meet all contractual obligations. However, with a dynamic...
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
We consider a system where a local cache maintains a collection of N dynamic content items that are randomly requested by local users. A capacity-constrained link to a remote network server limits the ability of the cache to hold the latest version of each item at all times, making it necessary to design an update policy. Using an age of information metric, we show under a relaxed problem formulation...
To meet the communication expectations of the future, mobile networks need to evolve quicker than ever toward systems with ultra-low latency, huge traffic volume and higher data rates. Cloud-enabled radio systems have been introduced as a promising solution to meet these demands with the help of network functions virtualization techniques and network edge processing capabilities, which allow for increased...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Infrastructure-as-a-Service environments are becoming increasingly popular. When there is a failure, many applications require service restoration within a few seconds. Reaction to failures in Cloud is still slow for many applications. Monitoring is limited to instance metrics that are not conducive to precise diagnosis due to complexity of virtualization in physical hosts. Interferences among different...
The Domain Name Service (DNS) is a vital service in the Internet. Much more than a simple translation mechanism, it also allows higher profile functionalities such as load balancing and enhanced content distribution. In the scope of cloud computing, DNS is foreseen as an elastic and robust service, supporting failover mechanisms, decentralised configuration and multi-tenant isolation.
Accurate capacity measurement of Internet services is critical to ensure high-performing production computing environments. In this work, we present our solution of performing accurate capacity measurement. Referred to as “LiveRedliner”, it uses live traffic in production environments to drive the measurement, hence avoiding many pitfalls that prevent capacity measurement from obtaining accurate values...
Modern applications are increasingly being composed from multiple components that require and consume services at dierent layers of the cloud stack. The diverse, dynamic and unpredictable nature of both cloud services and application workloads makes quality-assured provision of such cloud service-based applications (CSBAs) a major challenge. While elasticity and autoscaling gives CSBA providers the...
There is a spectrum of solutions are available for distributing content over the Internet today. One of these solutions is Content distribution networks (CDN). CDN need to make decisions, such as server selection and routing, to improve a performance of content distribution. But we must remember, that performance may be limited by various factors such as packet loss in the network, a small receive...
Application Performance Monitoring (APM) is crucial to any enterprise to ensure that the performance of its application or service is meeting the service level agreements. There is an inherent need for the APM of traditional networks to evolve, with the advances in the internet technologies. In this paper, we present a novel approach and framework for realizing a futuristic APM for Software Defined...
Provisioning of high I/O capabilities for high-end HPC architectures is generally considered a challenge. A good understanding of the characteristics of the utilisation of modern I/O systems can help address the increasing performance gap between I/O and computation. In this paper we present results from an analysis of server-side performance counters that had been collected for multiple years on...
In this paper we introduce a novel, dense, system-on-chip many-core Lenovo NeXtScale System® server based on the Cavium THUNDERX® ARMv8 processor that was designed for performance, energy efficiency and programmability. THUNDERX processor was designed to scale up to 96 cores in a cache coherent, shared memory architecture. Furthermore, this hardware system has a power interface board (PIB) that measures...
Ensuring the correct presentation and execution of web sites is a major concern for system developers and administrators. Unfortunately, only end users can determine which resources are available and working properly. For example, some internal or external addresses might be unavailable or unreachable for specific clients, while seemingly available resources, like JavaScript, might run with errors...
When Business support systems (BSS) suffer poor performance, the system administrator has to spot the problem of BSS as soon as possible. The monitoring system is a great help to quickly gain insight of the system from all sides. By the monitoring system, the administrator can evaluate various metrics on the different fields in one single arranged page and understands the whole picture of current...
This paper presents AUGURY, an application for the analysis of monitoring data from computers, servers or cloud infrastructures. The analysis is based on the extraction of patterns and trends from historical data, using elements of time-series analysis. The purpose of AUGURY is to aid a server administrator by forecasting the behaviour and resource usage of specific applications and in presenting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.