The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed....
Software often requires frequent updates to improve performance and reliability. Typically, a general update process is performed after terminating a program although this is not applicable to applications that require non-disruptive services such as networks and satellites. In order to address this issue, network service providers often provide a technology termed as an in-service software upgrade...
Multipath TCP is a recent TCP extension that enables the utilization of different paths for a single connection. This provides various benefits including bandwidth aggregation and fast handovers on mobiles. A Multipath TCP connection starts with a single TCP connection called subflow and other subflows are added later to increase bandwidth or support failover. One drawback of Multipath TCP is that...
In-memory key-value store is a crucial building block of large-scale web architecture. Given the growth of the data volume and the need for low-latency responses, cost-effective storage expansion and fast large-message processing are the major challenges. In this paper, we explore the design of key-value middleware that takes advantage of modern NVMe SSDs and RDMA interconnects to achieve high performance...
Cyber threats push the researchers towards developing detection frameworks for protecting Internet users. Remote administration tool (RAT) is one of the serious cyber tools used by the attackers to fully control the targeted victim machine. In this paper a host based detection framework is introduced for RAT detection. The proposed framework depends on fully analysis of the system behavior of the...
FPGA-based accelerators are becoming first class citizens in data centers. Adding FPGAs in data centers can lead to higher compute densities with improved energy efficiency for latency critical workloads, such as financial applications. However FPGA deployment in datacenters brings difficulties both to application developers, and cloud providers. Application writers need to deal with the interfacing...
Inter-process communication (IPC) is one of the crucial aspects of every microkernel. The message-passing interface (MPI) is a specification between different processes, which is used for communication amongst processes. Message Passing Interface Chameleon (MPICH) is the portable implementation of message passing interface. This paper delineates the comparison between IPC, MPI and MPICH in terms of...
We propose a server-based approach to manage a general-purpose graphics processing unit (GPU) in a predictable and efficient manner. Our proposed approach introduces a GPU server task that is dedicated to handling GPU requests from other tasks on their behalf. The GPU server ensures bounded time to access the GPU, and allows other tasks to suspend during their GPU computation to save CPU cycles. By...
Kernel Samepage Merging (KSM) is a Linux kernel module for improving memory utilization by searching and merging the redundant memory pages. When working with the hypervisors, such as Kernel-based Virtual Machine, KSM helps share identical memory pages of the hosted virtual servers so as to increase the server density. Nevertheless, while KSM improves the efficiency of the host system, it hurts the...
Laser shooting will gradually replace the traditional live fire shooting as the main shooting training method, this paper discusses the Linux environment based on laser shooting system server-side software design ideas and implementation of the program. The software uses a multithreaded architecture, the use of message queues as a tool for communication between threads. Based on the V4L2 standard-driven...
The problem of securely storing and processing a hierarchy of sensitive data is of paramount importance in many sectors, like Defense or Critical Infrastructures, just to name a few. Since years Industry and Academia have been involved in researches focused on multilevel security, formal languages, and new platform modeling frameworks. The Multiple Independent Levels of Security/Safety is a new paradigm...
Classification of remote sensing images often use Support Vector Machines (SVMs) that require an n-fold cross-validation phase in order to do model selection. This phase is characterized by sweeping through a wide set of parameter combinations of SVM kernel and cost parameters. As a consequence this process is computationally expensive but represents a principled way of tuning a model for better accuracy...
Remote server vulnerability exploit is one of the most troublesome threat to the Internet security. An effective defense against the remote vulnerability exploit is code randomization, which randomizes the program code address to disrupt the malicious payload execution. Unfortunately, code randomization is particularly susceptible to address exposure vulnerabilities; the leak of a single code or data...
The ever changing nature of network technology requires a flexible platform that can change as the technology evolves. In this work, a complete networking switch designed in OpenCL is presented, identifying several high-level constructs that form the building blocks of any network application targeting FPGAs. These include the notion of an on-chip global memory and kernels constantly processing data...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
In flexible functional split, functions of a virtualized evolved NodeB (eNB) can be disaggregated in distributed computational resources. One of the main constraints for their placement is the latency experienced by the communication between the Virtual Machines (VM) hosting the functions. This paper evaluates experimentally the latency limits for different functional splits providing insights on...
Today's data center servers are equipped with high speed and complex network adaptors, featuring an array of functions, e.g. hardware TX/RX queues, packet filters, rate limiters, etc. Recent work like IX, Arrakis, MultiStack has made us rekindle the user-level network stacks' innovation utilizing these commodity network adaptors. In this paper, we revisit the idea to move stacks' design from in-kernel...
As the number of processors and the size of the memory of computing systems keep increasing, the likelihood of CPU core failures, memory errors, and bus failures increases and can threaten system availability. Software components can be hardened against such failures by running several replicas of a component on hardware replicas that fail independently and that are coordinated by a State-Machine...
Containers have been used in many applications for isolation purposes due to the lightweight, scalable and highly portable properties. However, to apply containers in virtual network functions (VNFs) faces a big challenge because high-performance VNFs often generate frequent communication workloads among containers while the container communications are generally not efficient. Compared with hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.