The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Server selection is an important problem of cloud computing in which cloud service providers direct user demands to servers in one of the multiple data centers located in different geographical locations. The existing solutions usually assume homogeneity of cloud services (i.e., all users request the same type of service) and handle user demands in an individual basis which incurs high computational...
In public cloud networks, applications of different tenants compete for the shared network bandwidth and thus might suffer from unpredictable performance. It is desirable for cloud providers to offer tenants with bandwidth guarantees. However, it is challenging to precisely abstract tenant bandwidth requirements for their intra- and inter-tenant communications and to achieve work conservation simultaneously...
Scalable video coding is used with peer to peer networks to minimize the upload bandwidth of peers and to reduce the effects of churn. We have formulated an NP complete optimization problem to describe the upload bandwidth at each peer. We proposed an approximation algorithm to solve this problem. Furthermore, seed servers are deployed in the network to overcome the upload bandwidth limitation at...
Modularity and hierarchical-based design are crucial features that need to be supported in complex embedded systemscharacterized by multiple applications with timing requirements.Resource reservation is a powerful scheduling mechanism forachieving such goals and providing temporal isolation amongdifferent real-time applications. When different applications sharemutually exclusive resources, a precise...
Infrastructure-as-a-Service (IaaS), which is offered by cloud computing, has focused on providing computing and storage resources, considering network mostly as a required communication accessory and not as a resource itself. In other words, the ability to define network resources (e.g. routing/switching elements, bandwidth, delay) is still very limited. However, the need to have more robust solutions...
In cloud environments, resources can be requested on-demand when they are needed. A cloud management system is responsible for determining which physical machines are responsible for processing the requests. The problem of determining which servers are used for which services is referred to as the Cloud Application Placement Problem (CAPP), and multiple criteria such as cost and number of migrations...
Many cyber-physical systems comprise several control applications implemented on a shared platform, for which stability is a fundamental requirement. This is as opposed to the classical hard real-time systems where often the criterion is meeting the deadline. However, the stability of control applications depends on not only the delay experienced, but also the jitter. Therefore, the notion of deadline...
This paper aims to investigate the scheduling problem of a mixed task set in a real-time system. When a mixed task set is executed, a scheduling algorithm should consider system energy consumption and the average response time of aperiodic jobs. This paper proposes the Ratio-based Aggressive Reclaim Algorithm} (RARA) that reclaims unused execution time left by earlier-completed jobs and possible slack...
Cloud networking typically leads to scenarii where a large number of TCP connections share a common bottleneck link. In this paper, we focus on the case of TCP Cubic, which is the default TCP version in the Linux kernel. TCP Cubic is designed to better utilize high bandwidth-delay product path in an IP network. To do so, Cubic modifies the linear window growth function of legacy TCP standards, e.g...
Providing a-priori temporal guarantees is paramount in real-time systems. Although much of the normal operation in such a system is modeled using sporadic tasks, event-driven behavior is modeled using aperiodic jobs. To ensure an acceptable Quality of Service for aperiodic jobs without jeopardizing safety of sporadic tasks, aperiodic servers were introduced. While aperiodic servers periodically reserve...
P2P live streaming are increasingly popular nowadays. Due to their popularity, these systems may be a target of attacks and opportunistic user behavior. In this paper, we address the pollution attacks in such systems. We present a pollution damage model and also analyze a reputation system as a tool to fight attacks in P2P live streaming systems. The model we propose evidences that attacks are harmful...
The Internet is replacing the traditional telephone network as the ubiquitous network infrastructure. Internet customers are increasing at an exponential rate and will continue to increase in the near future. Among the various Internet services, IPTV VoD (Video on Demand) service is expected to be one of the most popular services. In general, for deploying streamed video service, it is likely to use...
Data centers consume significant amounts of energy. As severs become more energy efficient with various energy saving techniques, the data center network (DCN) has been accounting for 20% or more of the energy consumed by the entire data center. While DCNs are typically provisioned with full bisection bandwidth, DCN traffic demonstrates fluctuating patterns. The objective of this work is to improve...
Providing optimal Quality of Service (QoS) for Cloud Services Delivery Networks (CSDN) is a challenging task due to the mutual-interference phenomenon among multiple applications. Existing approaches only provide best-effort services, which aim to maximize the number of served users and sacrifice service dependability. To enhance the service dependability, designs of allocating fixed bandwidth among...
Energy-efficient computing is becoming more important with the latest technology improvements. State-of-the-art dynamic voltage/frequency scaling (DVFS) policies manage resources' voltage and frequency to achieve higher energy efficiency. A DVFS policy manages a single resource by continuously evaluating its utilization. We propose a new integrated DVFS policy that manages both CPU and memory. The...
Over the years of the emergence of peer-to-peer systems a phenomenon named 'Free Riding' has affected its performance and become a serious threat to be resolved. Free riding phenomenon was first felt in the study of Gnutella. As the number of free riders increases, the performance of the overall system decreases as free riders use resources without giving anything to the system. To solve the problem...
In recent years, there has been an increasing interest in P2P (Peer-to-Peer) streaming environments. There are various types of streaming contents. One of them is a content that can be separated into model and motion data like CG animations. The interruption times that occur during playing the data can be reduced by considering the time to start playing each type of data. However, previous researches...
Metaverses provide a framework for developing distributed 3D Internet applications where users gain presence through the proxy of an avatar. They offer much of the engagement of online 3D games but support heterogeneous applications. From the network perspective metaverses are similar to games in that timeliness is important but differ in that their traffic is less regular and requires more bandwidth...
The widespread deployment of varying networking technologies, coupled with the exponential increase in end-user data demand, have led to the proliferation of multi-homed or multi-interface enabled devices. To date, these interfaces are mainly utilized one at a time based on network availability, cost, and user-choice. While researchers have focused on simultaneously leveraging these interfaces by...
In this paper we both simulate and analyze in order both to measure the number of users with server loads under different conditions and to find any changes in system response time and bandwidth. We mainly use the ASP multiplication cycle to change the CPU load, and we adjust the number of users to measure their grasp of server data and parallel state system ASP multiplication loops and the relationship...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.