The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sharding implementations use consistent hashing for distributing a database uniformly across the servers in the topology. Each data item in the database is identified uniquely by a sharding key. The sharding keys are hashed into a hash ring. This hash ring is split into equal sized partitions and each server is allocated an equal number of partitions. Each partition represents a portion of the database,...
The content delivery network (CDN) intensively uses cache to push the content close to end users. Over both traditional Internet architecture and emerging cloud-based framework, cache allocation has been the core problem that any CDN operator needs to address. As the first step for cache deployment, CDN operators need to discover or estimate the distribution of user requests in different geographic...
This paper addresses the problem of service function chaining in a network. Currently, problems of chaining services in a network (i.e., service function chaining) can be broadly categorised into middlebox placement in a network and packet steering through middleboxes. In this work, we propose a One Pass Packet Steering (OPPS) approach for use in multi-subscriber environments, with the aim of reducing...
An increasing number and variety of devices are connected to the Internet. Thus, it is expected that peer-to-peer (P2P) networks, which have no central servers, will solve the server overload issue in the client-server communication model. Among P2P information search schemes, we focus on Skip Graphs, because they exhibit strong churn resilience and have a range search function, which is desirable...
The overlay network has been widely developed in recent years. There may be various overlays that co-exist with each other upon the same underlying network. These overlays have heterogeneous performance goals, and they will compete for the physical resources, so that a sub-optimal performance of the overlays may be achieved. Moreover, the heterogeneity of the overlays makes them difficult to coordinate...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
While there are many motivations to virtualize networks, easing their management is probably one of the most important reasons. However, the choice of the network abstraction model that will be used to abstract the physical infrastructure represents a major challenge, given that this choice will have a significant impact on what an administrator can see and do. In this article, we present a new domain...
The topology of networks typically remains static over long periods of time, giving attackers the advantage of long planning cycles to develop, test, and refine targeted attacks. The CINDAM design preempts the attacker by creating ephemeral, per-host views of the protected enclave to transform the constant topology of computing networks into deceptive, mutable, and individualized ones that are able...
Network Functions Virtualization (NFV) is a recent industrial trend which gains a lot of attention from telecom operators and vendors. The NFV concept delivers network services using commercial off-the-shelf hardware and IT virtualization technologies, thus virtualizing entire classes of network node functions. Traditional and recent data-center architectures are mostly built and optimized for data...
Large enterprises are confronted with an increased need to fully understand the IT systems that support their business applications. Unfortunately, conventional communication trace-based approaches to discovering IT infrastructure dependencies are insufficient to gain a comprehensive mapping of business applications to IT infrastructure. This paper describes BizMap, a novel, information-discovery-based...
Information centric networks (ICNs) allow content objects to be cached within the network, so as to provide efficient data delivery. Existing works on in-network caches mainly focus on minimizing the redundancy of caches to improve the cache hit ratio, which may not lead to significant bandwidth saving. On the other hand, it could result in too frequent caching operations, i.e., cache placement and...
New communication protocols, as WiFi Direct, are now available to enable efficient Device-to-Device (D2D) communications in wireless networks based on portable devices. At the same time, new network paradigms, as Content-Centric-Networking (CCN), allow a communication focused on the content and not its location within the network, enabling a flexible location for the content, which can be cached in...
In this paper we propose an efficient scheme for supporting multi-path based in-network content caching by leveraging Loop-Free Alternate (LFA) in IP routing. The purpose is to enable clustered distribution of cached content chunks at en-route routers between the content source and the requester. In order to achieve caching localization, we also introduce policies that limit the maximum allowable...
Information Centric Networking (ICN) paradigms aim at optimizing computer networks for information distribution. Named Data Networking (NDN) and its implementation CCNx propose a promising globally implementable ICN. Routing on names, however, may result in extremely large global routing tables. In this paper, we propose to confine the global routing table size by decoupling context-related names,...
This paper introduces a framework and a methodology to manage a SaaS application on top of a PaaS infrastructure. This framework utilizes PaaS policy sets to implement the SaaS providers elasticity policy for its application server tier. A strategy-tree is utilized at the SaaS layer to actively guide policy set selection at runtime in order to maintain alignment with the SaaS providers business objectives...
Optical grids are widely deployed to solve complex problems we are facing today. An important aspect of the supporting network is resiliency i.e. the ability to overcome network failures. In contrast to classical network protection schemes, we will not necessarily provide a back-up path between the source and the original destination. Instead, we will try to relocate the job to another server location...
Network configuration errors pose a major headache for the network operators today. Existing approaches of solving the problem either have considered the development of specialized configuration checkers that identify violation of a correct configurations [12, 11, 17, 4], or have considered the automatic configuration of networked devices [6]. In this paper we follow a different approach. We consider...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.