The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The elastic provisioning of Virtual Infrastructures (VIs) enables a dynamic management of cloud resources (computing and communication) in order to meet the hosted application's requirements. Thus, to perform elasticity requests, providers usually rely on reallocation mechanisms and policies. The concerns regarding the environment and the operational costs indicate energy consumption of the data centers...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they...
Multipath TCP is a recent TCP extension that enables the utilization of different paths for a single connection. This provides various benefits including bandwidth aggregation and fast handovers on mobiles. A Multipath TCP connection starts with a single TCP connection called subflow and other subflows are added later to increase bandwidth or support failover. One drawback of Multipath TCP is that...
Fuelled by the proliferation of smartphones, wireless traffic has experienced huge growth, which will continue with the emergence of ultra-broadband 5G applications, and exacerbate the capacity strain in cellular networks. Deployment of pico access points, reducing cell sizes and allowing more efficient reuse of limited radio spectrum, provides a powerful approach to cope with traffic hot spots and...
Scale-out distributed storage systems have recently gained high attentions with the emergence of big data and cloud computing technologies. However, these storage systems sometimes suffer from performance degradation, especially when the communication subsystem is not fully optimized. The problem becomes worse as the network bandwidth and its corresponding traffic increase. In this paper, we first...
The paper proposes the solution of the actual scientific problem of load balancing and efficient use of distributed system resources. The proposed method is based on the calculation of the load of the central processor, memory and bandwidth fractal information streams of different classes of service for each server and the entire distributed system. The method allows calculating the imbalance of all...
Most load balancing techniques implemented in current data centers tend to rely on a mapping from packets to server IP addresses through a hash value calculated from the flow five-tuple. The hash calculation allows extremely fast packet forwarding and provides flow `stickiness', meaning that all packets belonging to the same flow get dispatched to the same server. Unfortunately, such static hashing...
Nowadays we can see very rapid evolution of algorithms for Advanced Driver Assistance Systems (ADAS). With every new algorithm there is need for more processing power. The problem with this is the fact that hardware, that runs algorithms, cannot support so fast growing need for more processing power because development of the hardware is a lot slower than software development. One of the possible...
This article selects load balancing system technology to analyze, combines the live migration technology of virtual machine, and studys the frame of virtual machine live migration as well as the mathematical model applied to concrete process of the migration. The article presents that the process of combining the specific strategies of load balance to the frame of live migration, that the simulation...
This research provides a concise answer to how to organize a strong infrastructure of information technologies for high availability based on open source software, it's necessary for large organizations to provide high availability, the work will focus on explaining the procedures to provide services for users 24 hours the 365 days. Centralization is a major weakness today because is the only source...
Nowadays, the availability of Internet services is very important. One of these internet services is information system service. When the information system can not be accessed, the user cannot access the information. Therefore, the server used for that application should remain online nonstop. However, in reality the services failure often happens due to server error or repairing process. One of...
This paper proposes a new version of the Power of Two Choices, SQ(d), load balancing algorithm that improves the performance of the classical model based on the power of two choices randomized load balancing. This model considers jobs that arrive to a dispatcher as a Poisson stream of rate λn, λ 1, at a set of n servers. Using the power of two choices, the dispatcher chooses for each job some d constant...
In recent years, there is a rapid growth in the internet services which has increased incoming traffic in the network and also plays a vital role in increasing the size of the cluster server. The load balancing is a key technology to manage the traffic efficiently. In this paper, we propose an alternative load balancing architecture using OpenFlow switches which are connected to the controller. This...
Cloud Computing is the current trend and will be future era because of its advantages like pay per usage and on demand services. Load Balancing is a key aspect of Cloud Computing. It is the distribution of network or applications traffic across a number of servers. As the volume of data is increasing day by day the organizations will migrate from traditional computer system to the cloud based system...
The Memcached system has no redundancy mechanism. In special cases, there will be a performance degradation of the server and the single-point-of-failure. For these reasons, MS_Memcached, a distributed cache system with master-slave mode, is presented in this paper. It maintains the slaves from the masters with the asynchronous message queue. By using a dynamic feedback load balancing algorithm, the...
The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes...
It is well known that load balancing and low delivery communication cost are two critical issues in mapping requests to servers in Content Delivery Networks (CDNs). However, the trade-off between these two performance metrics has not been yet quantitatively investigated in designing efficient request mapping schemes. In this work, we formalize this trade-off through a stochastic optimization problem...
This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed...
Nowadays many companies and organizations choose to deploy their applications in data centers to leverage resource sharing. The increase in tasks of multiple applications, however, makes it challenging for a data center provider to maximize its revenue by intelligently scheduling tasks in software-defined networking (SDN)-enabled data centers. Existing SDN controllers only reduce network latency while...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.