The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High-performance computing, enterprise, and datacenter servers are driving demands for higher total memory capacity as well as memory performance. Memory “cubes” with high per-package capacity (from 3D integration) along with high-speed point-to-point interconnects provide a scalable memory system architecture with the potential to deliver both capacity and performance. Multiple such cubes connected...
The bursty many-to-one communication pattern, typical for data acquisition systems, but also present in datacenter networks, is particularly demanding for commodity TCP/IP and Ethernet technologies. We expand our study of building incast-resistant networks based on software switches running on commercial-off-the-shelf servers. In this paper we provide the estimates for costs and physical area required...
We need more skilled cybersecurity professionals because the number of cyber threats and ingenuity of attackers is ever growing. Knowledge and skills required for cyber defence can be developed and exercised by lectures and lab sessions, or by active learning, which is seen as a promising and attractive alternative. In this paper, we present experience gained from the preparation and execution of...
In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they...
Software-Defined Networking (SDN) is an emerging technology that supports recent network applications. An SDN redefines networks by introducing the concept of decoupling the control plane from the data plane, thus providing centralized management, programmability, and dynamic reconfiguration. In this research, we specifically investigate the significance of using SDNs in support of Big-Data applications...
Cisco DevNet Always-On APIC-EM Sandbox is useful in the phase of learning about software-defined networking, allowing to perform experiments, but without the possibility to change the topology the extent of development is limited. In this paper a Cisco APIC-EM SDN Controller was installed in a private cloud orchestrated by OpenStack. The major objective was to create a virtualized testbed, consisting...
In this era of big data and internet of things, the need for performance improvement in cloud data center is unavoidable. This has led to several designs of data center network topologies with the aim of achieving a data center that has the capability of tolerating fault during multiple failures. In this paper, we proposed improved variants of fat-tree interconnections to mitigate the challenges of...
Server security is necessary to avoid all attack that will happen. IPS (Intrusion Prevention System) is an example of right solution for the security system. IPS can prevent an attack by using the IDS (Intrusion Detection System) and firewall features. In this paper, bro IPS on the server will be tested with some attack include DOS (Denial of Service), port scanning, and ftp brute force to ensure...
Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network...
Ubiquitous in-network caching is one of the important aspects of the Information-Centric Networking (ICN), which has been a hot topic of ICN research. Many works have tried to propose better caching schemes to solve the drawbacks of the default en-route scheme, but most of them are insufficient to improve performance of entire network for just considering single layer optimization factor. Also considering...
In this paper, we present MiniWorld, a novel distributed network emulator. It is based on full virtualization using QEMU/KVM, offers three network backends for emulating both wired and wireless communication, and provides several mobility patterns as well as distance-based link quality models. A snapshot boot mode is offered for accelerated booting of identical environments and repeating emulation...
Energy consumption has become a key issue for running large-scale data center networks (DCN) nowadays. Previous studies mainly focus on energy saving through reducing the number of active servers or network switches with traffic consolidation. However, since this mechanism benefits from the routing flexibility, both the gained energy savings and flow performance are limited by the conventional static...
Due to the variability of network topologies and services that can be deployed in the transport network, traffic engineering decisions within a software defined networking (SDN) controller need to be influenced by the current network topology, available resources, and end user experience. In this work a holistically approached traffic engineering quality of experience (QoE) feedback application is...
This paper aims to quantitatively measure the impact of different data centers networking topologies on the performance and energy efficiency of shuffling operations in MapReduce. Mixed Integer Linear Programming (MILP) models are utilized to optimize the shuffling in several data center topologies with electronic, hybrid, and all-optical switching while maximizing the throughput and reducing the...
Middleboxes (MBs) are ubiquitous in modern data centre (DC) due to their crucial role in implementing network security, management and optimisation. In order to meet network policy's requirement on correct traversal of an ordered sequence of MBs, network administrators rely on static policy based routing or VLAN stitching to steer traffic flows. However, dynamic virtual server migration in virtual...
The problem of efficient resource management in large cloud data centres is well recognised in the cloud management community. With the rising demand for cloud services and expansion of the size and distribution of data centres, the repercussions of not taking into account all parameters of interest while allocating resources are becoming significant. Hence, one of the major issues today is how to...
Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a...
Erasure-coded storage systems have gained considerable adoption recently since they can provide the same level of reliability with significantly lower storage overhead compared to replicated systems. However, background traffic of such systems - e.g. repair, rebalance, backup and recovery traffic - often has large volume and consumes significant network resources. Independently scheduling such tasks...
This paper proposes a collaborative in-network caching method for multi-path routing. In-network caching allows routers in networks to store contents in their caches and users can download the contents from the routers in addition to content servers. In such a situation, the proposed method introduces a joint optimization problem of in-network caching and multi-path routing, which is formulated as...
Today's Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.