The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accelerators have emerged as an important component of modern cloud, datacenter, and HPC computing environments. However, launching tasks on remote accelerators across a network remains unwieldy, forcing programmers to send data in large chunks to amortize the transfer and launch overhead. By combining advances in intra-node accelerator unification with one-sided Remote Direct Memory Access (RDMA)...
In high-speed networks, it is important to detect the presence of large flows—also known as elephant flows—because of their adverse effects on delay-sensitive flows. If detected on a timely fashion, network operators can apply active policies such as flow redirection or traffic shaping to ensure the overall quality of service of the network is preserved. Towards this objective, we develop a high-performance...
The article introduces the reasons for realisation of the remote laboratory of computer networks which originate from the comparisons of the alternatives of working with the specialised networking hardware. These use the principle of virtualisation or simulation of such devices as an alternative for obtaining competencies from the area of computer networks. Due to this reason, this article discusses...
Computer network in work and life bring convenience for people at the same time, also inevitable has brought some safe hidden trouble. To bring the positive role of efficient use of computer network, you need to effectively safeguard the security of computer network information. This article mainly analyzes the present situation of computer network security problems, analyzes the main source of computer...
Supporting three of the four main user communities of the Large Hadron Collider (LHC) at CERN, RO-07-NIPNE is the most complex grid site of the Romanian Tier-2 Federation (RO-LCG, http://lcg.nipne.ro). Here we present an overview of the recent hardware, software and network implementations at the grid site, in view of the computational support for the second run of the LHC. Special emphasis is placed...
Effects on computer networks due to intentional electromagnetic interference (IEMI) are a well known phenomena. However, when a perturbation occurs in a real world environment the effects may not always be obvious. In case computers crash or reboot repeatedly it is clear that there is a source of malfunction. The same applies to flickering monitors or unpredictable behaviour of input devices. But...
A method of evaluation of service providing for users in a infocommunication system is proposed in this paper. The method is based on the layered concept with three layers: physical, logical, information. The method uses the generalized integral evaluation of the user's environment, which is estimated for a user on a session period.
Hands-on practical experience through lab work has long been recognized as an important part of the computer network education. Successful computer network hands-on activities require a full range of related devices with actively maintaining. This paper presents prototype architecture of a Xen-based Networks Laboratory Service Cloud (NLS-Cloud, original CLESP) that can provide an entire computer networks...
In order to meet the needs for the curriculum reform of Electronic Engineering Department of Tsinghua University, we constructed routing and switching experimental platform using the control network technology based on ZTE's switches and three-layer routers. The platform supports the computer network experiment course and practice in open extracurricular for undergraduate.
QUonG is an INFN (Istituto Nazionale di Fisica Nucleare) initiative targeted to develop a high performance computing system dedicated to Lattice QCD computations. QUonG is a massively parallel computing platform that lever-ages on commodity multi-core processors coupled with last generation GPUs. Its network mesh exploits the characteristics of LQCD algorithm for the design of a point-to-point, high...
With the growing speed of computer networks, the core routers have to increase performance of longest prefix match (LPM) operation on IP address. While existing LPM algorithms are able to achieve high throughput for IPv4 addresses, the IPv6 processing speed is limited. In this paper we propose a new Hast-Tree Bitmap algorithm for fast longest prefix match for both IPv4 and IPv6 networks. The algorithm...
Researchers investigating mobile and wireless systems can run experiments on many testbeds, but no existing option supports experimentation “in the wild“ without sacrificing features such as access to low-level wireless state and efficient scheduling of co-local guests. To fill this void, we present a new architecture for mobile testbeds called CrowdLab. CrowdLab allows researchers...
Virtual routers on commodity hardware are an attractive solution for service providers that look for extensibility, flexibility, reuse and low deployment cost. However, these routers still suffer from performance limitations due to the virtualization overhead and the commodity hardware architecture itself. In this paper, we first evaluate the baseline forwarding performance of virtual routers based...
Increasing speeds and volumes push network packet applications to use parallel processing to boost performance. Examining the packet payload (message content) is a key aspect of packet processing. Applications search payloads to find strings that match a pattern described by regular expressions (regex). Searching for multiple strings that may start anywhere in the payload is a major obstacle to performance...
Data security is one of the major concerns in today's scenario. However, due to availability of information related to networks and free software, hackers can easily hack into different computers without even having much in-depth knowledge of the network architecture. It is very hard to protect our valuable data from others and it is impossible to restrict hackers by installing firewalls and other...
Wireless sensor network (WSN) has been a hot research topic and widely deployed in many settings that require data acquisition, processing and communication on sensor devices equipped with a simple low powered microcontroller. This computing paradigm on long lasting operations of battery powered devices is resulted from state-of-the-art research efforts of computer science (CS) and computer engineering...
System dependability plays an important role in the realization of computer communication infrastructures and the everyday operations and maintenance of computer networks. Increased redundancy is used as a common practice to improve dependability, however in some cases duplication of a networking equipment is not desirable due to high cost or increased system complexity as a result of handling potentially...
PBL (Problem Based Learning) is a learner-centered teaching method which is based on constructivist educational theory. How to design and implement the teaching mission is the key to "PBL Pedagogy". This paper, with the discussion of the practical experience of the PBL pedagogy in “Computer Network Technology” course, introduces the general teaching principles and methods of how to use the...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We are comparing different types of anomaly detection methods with the purpose of achieving results covering a broad spectrum of anomalies. We also outline the datasets that we will be using and the metrics that we will use for our evaluation.
Practical experience is considered a vital part of university level courses in Information Technology (IT). A practical component of computer networking related courses, at the application level, requires multiple servers to be studied by the students. Many of such servers may be incompatible with each other and it may be required that they be installed on different platforms. This issue leads to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.