The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
The current ecosystem of network elements, such as switches and appliances, is largely dominated by devices supplied and sold with a bundled operating system, and software dedicated to manage the device's forwarding hardware, however, these platforms are not open-source and cannot be arbitrarily customized, and there is no cost transparency or flexibility in choosing software different to the bundled...
This experience report analyses security problems of modern computer systems caused by vulnerabilities in their operating systems. An aggregated vulnerability database has been developed by joining vulnerability records from two publicly available vulnerability databases: the Common Vulnerabilities and Exposures system (CVE) and the National Vulnerabilities database (NVD). The aggregated data allow...
In the US alone, data centers consumed around $20 billion (200 TWh) yearly electricity in 2016, and this amount doubles itself every five years. Data storage alone is estimated to be responsible for about 25% to 35% of data-center power consumption. Servers in data centers generally include multiple HDDs or SSDs, commonly arranged in a RAID level for better performance, reliability, and availability...
This paper examines the security provided by different implementations of Address Space Layout Randomization (ASLR). ASLR is a security mechanism that increases control-flow integrity by making it more difficult for an attacker to properly execute a buffer-overflow attack, even in systems with vulnerable software. The strength of ASLR lies in the randomness of the offsets it produces in memory layouts...
Increasing amounts of data from varied sources, particularly in the fields of machine learning and graph analytics, are causing storage requirements to grow rapidly. A variety of technologies exist for storing and sharing these data, ranging from parallel file systems used by supercomputers to distributed block storage systems found in clouds. Relatively few comparative measurements exist to inform...
In view of the current smart home comfort, human-computer interaction, cost, power consumption and other aspects of the problem, the ZigBee wireless sensor communication technique is adopted to form home data and control network. Combined with 3G/4G network technology, the intelligent home remote monitoring system is developed on the basis of embedded web gateway, cloud server and smart phone app...
This work aims to provide details on how to build an automated Environment Controlled Poultry Management System (ECPMS) using low cost commodity hardware and open source software. An all-inclusive system was developed using RaspberryPi-3, used as a Linux embedded processing unit and ArduinoMega board for interfacing with array of sensors. The system has been systematically investigated for different...
This paper presents an evaluation of an experiment conducted on a server to analyse how horizontal scalability affects its performance. This paper studies the results obtained by measuring response times and processing times when dealing with many requests by adding more machines to the system. This paper presents the technologies used to build this system of machines as well as the results obtained...
Laser shooting will gradually replace the traditional live fire shooting as the main shooting training method, this paper discusses the Linux environment based on laser shooting system server-side software design ideas and implementation of the program. The software uses a multithreaded architecture, the use of message queues as a tool for communication between threads. Based on the V4L2 standard-driven...
A novel design of pole mounted switch controller is introduced in this paper, embedded Linux operating system was used to enrich the functions of the pole mounted controller and to enhance the intelligence of the controller. Software structure of this novel designed controller is presented in detail. Multiple processes design method was applied to split the software application into 3 processes, namely...
Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is using that client system is trustworthy. This can be achieved by a technique called remote attestation. This study presents a three-phase remote attestation protocol which provides relaxation...
PCIe bus is widely applied because of its high-bandwidth, high reliability and low cost characteristic. Research on PCIe root complex architecture based on FPGA begin to receive attentions. However, current methods are usually expensive, code closure and poor flexibility. A new open source PCIe root system architecture based on Xilinx SOPC platform is proposed in this paper. The system is mainly composed...
In this paper, we present MiniWorld, a novel distributed network emulator. It is based on full virtualization using QEMU/KVM, offers three network backends for emulating both wired and wireless communication, and provides several mobility patterns as well as distance-based link quality models. A snapshot boot mode is offered for accelerated booting of identical environments and repeating emulation...
A standardized Communication / Information Protocol is necessary for implementing the 4 upper digitalization layers of Industrie 4.0-compliant solutions. OPC UA is one of the leading and preferred technology. Currently, there are many different OPC UA implementations available on the market. This paper gives an overview of existing solutions and shows the results of an initial benchmarking based on...
Cyber-physical systems (CPS) are key enabling technologies for the fourth industrial revolution, referred to as Industrie 4.0 or Industry 4.0. The Reference Architecture Model Industrie 4.0 (RAMI4.0) has recently been standardized and OPC Unified Architecture (OPC UA) is listed as the sole recommendation for implementation of a communication layer. Many automation and control systems offer already...
The growing popularity of mobile devices and Internet of Things (IoT) has inspired the advent of the Cloudlet concept—a "small data center" close to users at the edge. It is believed that the Quality of Experience (QoE) of end users would greatly improve if they can access required resources within a one-hop distance from Cloudlet servers. Over the years, many researchers have proposed using...
Remote server vulnerability exploit is one of the most troublesome threat to the Internet security. An effective defense against the remote vulnerability exploit is code randomization, which randomizes the program code address to disrupt the malicious payload execution. Unfortunately, code randomization is particularly susceptible to address exposure vulnerabilities; the leak of a single code or data...
Applications making use of embedded systems are anticipated to become extremely important as we advance towards realizing the vision of "Internet of Things" with smart devices such as Raspberry Pi, and compute-anywhere paradigm where principles of distributed systems play pivotal roles. A case we envision here is a distributed network of low powered devices to accomplish various tasks autonomously...
Network Function Virtualization promises to reduce the overall operational and capital expenses experienced by the network operators. Running multiple network functions on top of a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware and reduce the maintenance and management costs. However, total cost of ownership calculations are typically a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.