The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The desire to move the applications from on-premise to cloud or to move it between the clouds gives a precious freedom to the clients and enables them to freely change the cloud service provider. The ability to move the application is a hot research topic and is not solved completely yet, neither by the vendors, since they prefer client lock-in, nor by cloud providers, that have great challenges to...
Unlike the current Internet where applications have little control over the path that their data travels, emerging network architectures enable applications to control the path their packets/flows take. Although an application can select its paths, providing an application with the up-to-date information needed to make an informed decision is a difficult problem. In particular, monitoring (i.e., collecting...
Information centric networks (ICNs) allow content objects to be cached within the network, so as to provide efficient data delivery. Existing works on in-network caches mainly focus on minimizing the redundancy of caches to improve the cache hit ratio, which may not lead to significant bandwidth saving. On the other hand, it could result in too frequent caching operations, i.e., cache placement and...
The needs of the research communities in research institutes and Higher Education (HE) establishments are demanding evermore powerful computing resources for supporting complex scientific and industrial simulation and modeling, manipulating and storage of large quantities of data [6, 9]. In this paper we present our experience at the University of Huddersfield (UoH), UK in developing the HPC systems...
A fundamental goal of data center networking is to efficiently interconnect a large number of servers with the low equipment cost. Several server-centric network structures for data centers have been proposed. They, however, are not truly expandable and suffer a low degree of regularity and symmetry. Inspired by the commodity servers in today's data centers that come with dual port, we consider how...
Modernizing experimentation in system-oriented courses such as computer networks and distributed systems is often challenging due to the raw and complex nature of infrastructure testing. In these practical courses, students not only need access to network layers and system kernels, but they often need to reason about consistency issues associated with the distributed nature of these experiments. This...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
Address auto-configuration is a key problem in data center networks, where servers and switches encode topology information into their addresses for routing. A recent work DAC [2] has been introduced to address this problem. Without malfunctions, DAC can auto-configure all the devices quickly. But in case of malfunctions, DAC requires significant human efforts to correct malfunctions and it can cause...
We have developed a mobility prediction algorithm that reflects in a customized AODV designed for k-hop dominating set file sharing scenario. Mobility of a node is detected based on the received signal strength (RSS) measurements. This measurement serve as a basis for a client to associate with nearest dominating node (file server) to always have access to the files. Our proposed mechanism ensures...
Understanding the structure and dynamics of the user behavior networks that connect users with servers across the Internet is a key to modeling the network and designing future application. In this paper, we obtained the result that the out-degree distribution of clients (the host initiating the connection), the in-degree distribution of servers (the host receiving the connection) are approximately...
We present the second version of Realcourse. Realcourse is a cooperative Internet video publishing and delivery system used by more than thirty Chinese universities to share course videos. The design of Realcourse bears the following assumptions 1) the system is supposed to consists of hundreds of unreliable but controllable servers where temporal failures are common, permanent failures are rare,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.