The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on incentive, free rider, and fairness issues of p2p streaming systems. P2P streaming systems, applying p2p model over streaming applications, significantly improve the system scalability. However, instability and loose control of p2p model also impose uncertainty factors to p2p streaming systems. This paper proposed a contribution-aware p2p model, denoted as CAPS- Contribution...
Based on the stochastic high level Petri net, this paper put forward a new availability model of Web-server Clusters. This model facilitates availability analysis of per service type and whole services. Through the Numerical analysis, we find that different load distribution and scheduling algorithm has different availability under same loads.
Data replication has been widely used as a mean of increasing the data availability of large-scale storage systems where failures are normal. Aiming to provide cost-effective availability, and improve performance and load-balancing of large-scale storage cluster, this paper presents a dynamic replication management scheme referred to as DRM. A model is developed to express availability as function...
Modern cloud infrastructures live in an open world, characterized by continuous changes in the environment and in the requirements they have to meet. Continuous changes occur autonomously and unpredictably, and they are out of control of the cloud provider. Therefore, advanced solutions have to be developed able to dynamically adapt the cloud infrastructure, while providing continuous service and...
This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing: 1. Automation of end-to-end failover of mission critical virtualized application, a SAN network and EMC Clarion based storage to a remote site and 2. On-demand and scheduled assurance of failover and measurement of RPO and RTO (The Recovery Point Objective...
Clustering solutions are frequently used in large enterprise and mission critical applications with high performance and availability requirements. This is achieved by deploying multiple servers for the purpose of load balancing or by having redundant servers for the purpose of high availability. Most cluster management tools focus on the availability of servers and IP connectivity, and rely on shared...
This paper presents an analysis of player behavior in a Massively Multiplayer Online Role-Playing Game (MMORPG). We examine player behavior in terms of when, how much, and what they do in the virtual world. Player behavior is described through previously defined action categories for MMORPGs (Trading, Questing, Dungeons, Raiding, and Player versus Player (PvP) Combat) with addition of a new category...
The increasingly popular online hosting systems are designed to provide versatile and convenient platforms for content hosting and sharing. To guarantee adequate levels of service quality while conserving prohibitive server costs, such systems are often designed to integrate peer bandwidth contributions with strategic server resource provisioning in a complementary and transparent manner. This paper...
With this work we present the activity and performance optimization of the Italian computing centers supporting the ATLAS experiment forming the so-called Italian Cloud. We describe the activities of the ATLAS Italian Tier-2s Federation inside the ATLAS computing model and present some Italian original contributions. We describe StoRM, a new Storage Resource Manager developed by INFN, as a replacement...
Load balancing in distributed computing environment enhances the availability and scalability of entire system. The computational paradigm has shifted dramatically from standalone computing, C/S computing, distributed computing to cluster computing paradigm. Although numerous works has been done on the issue of process migration and load balancing, a comprehensive approach still misses out on various...
After analyzing malicious attacks against host that affect the host resource usage a method is presented to evaluate the security situation of host system based on host resource availability. A group of factors that can reflect the host resource availability features in a fixed time window are selected as the evaluation metrics. Based on the large samples, the information entropy gain method is applied...
The market and users' requirements have been rapidly changing and diversified. Under these heterogeneous and dynamic situations, not only the system structure itself, but also the accessible information services would be changed constantly. To cope with the continuously changing conditions of service provision and utilization, faded information field (FIF) has been proposed, which is an agent-based...
Sensor webs are often composed of servers connected to distributed real-time embedded (DRE) systems that operate in open environments where operating conditions, workload, resource availability, and connectivity cannot be accurately characterized a priori. The South East Alaska MOnitoring Network for Science, Telecommunications, Education, and Research (SEAMONSTER) project exhibits many common system...
This paper presents a simple decentralized service deployment mechanism that can be used to offer services with high availability by using contributed resources with variable, possibly very low availability. It uses little information about the state of the group, and provides best-effort results. Contributory computer systems are those where users provide their own resources to be used collectively...
Security is the condition that prevents unauthorized persons from having access to official information that is safeguarded in the interests of some particular purpose. Data security ensures that kind of private and sensitive data from corruption and the access to it is suitably controlled. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from...
Recent outages in several Web services have demonstrated the potential damage of availability disruptions, since millions of end users rely on these services powered by thousands of servers in large-scale Internet data centers. As Internet data centers continue to grow in scale and complexity, it has become a daunting task to monitor and manage thousands of servers simultaneously. This paper presents...
Compared to the voice service over PSTN, people look forward to a competent voice over IP (VoIP) service. The introduction of the SIP protocol has a profound impact on the VoIP world. Exploiting more SIP proxy servers can raise the service availability. However, how to assure the efficiency and availability of the service by such an improvement becomes a challenging issue. Based on above, we propose...
Mobile ad hoc network (MANET) is suitable for providing a communication platform for resource sharing or instant messaging to people in public places where no communication infrastructure exists. Like many other applications of MANET, the application over the communication platform has non-trivial security requirements due to the unique features of MANET (e.g. the open nature of wireless links and...
In this paper, we address the service consolidation problem: given a data-center, a set of servers and a set of multi-tiered services or applications, the problem is to allocate services to the available servers in order to minimize the number of servers to use while avoiding the overloading of system resources and satisfying end-to-end response time constraints. Exploiting queueing networks theory,...
In order to provide guaranteed services in P2P networks, applications have to be supported by sufficient computing resources, especially bandwidths and storage spaces, which are acquired from the heterogeneous peers. As soliciting peers' resources contribution by giving remunerations imposes an additional cost, the guaranteed services should be provided cost-effectively. In this paper, after defining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.