The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper discusses new scheduling algorithms that are modifications of classical cycle based scheme, named the cycle based algorithm with time alternating priorities and time guard. The classical cycle based algorithm assumes that a given packet stream can be served only in predefined periods while it is not entitled to receive service in the periods dedicated to serve other packet streams. This...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
Network Function Virtualization (NFV) is a promising solution for telecom operators and service providers to improve business agility, by enabling a fast deployment of new services, and by making it possible for them to cope with the increasing traffic volume and service demand. NFV enables virtualization of network functions that can be deployed as virtual machines on general purpose server hardware...
Current Network Function Virtualization (NFV) with Virtualized Network Functions (VNFs) running as virtual machines on commodity servers enables flexibility to Service Function Chaining (SFC). Specific applications may require Quality of Service (QoS) on end-to-end latency. However, the processing delay and the queuing delay of VNFs varies with virtual resource configurations (vCPU and vMemory), as...
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
To support mobile devices with different screen resolutions, social video sharing sites need to provide distinctive versions of the videos for mobile users to choose, resulting in the consumption of massive storage space. Scalable Extensions of the High Efficiency Video Coding (SHVC) can reduce about 15–30% storage of distinctive video spatial resolution. Meanwhile, traditional video caching technology...
With the omnipresence of the Internet of Things and poorly secured devices with it in combination with high bandwidth networks, Distributed Denial of Service (DDoS) attacks have become one of the biggest threats for network security. With high bandwidth attacks flooding network infrastructure, the pressure to secure the attack targets shifts more and more to the network operators. Often without direct...
In this study, a system has been developed to provide meaning and classification of e-mails according to their contents. The aim of the work is to develop an intelligent inbox to assist in awareness of information security. In the designed system, a client is developed that can connect to the server and receive e-mails. A two-step analysis is performed on the received e-mails. For both stage analysis,...
We consider a mobile-CDN system where base stations (BSs) are equipped with storage for replicating and distributing content. In such a system, BSs cooperation in replying user requests is a widely adopted mechanism. For such cooperative caching, a key issue is the joint optimization of content placement and request redirection, which has been intensively investigated in the literature. However, optimizing...
We consider the conditions of functioning of the distributed measurement system according to the strict schedule. The system consists of several local stations integrated into the computer network with the ring structure. Sensors of measurement system have different polling periods (polled with different frequencies) with frequencies ratios are natural numbers. Design method for the operation of that...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
QoS of applications in an edge node of mobile edge computing (MEC) could degrade due to congestion of wireless access or short of mobile edge computing resource. In order to improve QoS such as TCP throughput, we propose a VM migration method, which takes a VM from congested node to another node in a mobile edge. Users can choose a far but less-congested node, instead of a near but congested node...
The ability to provide a high Quality of Service is a crucial aspect in the acceptance and widespread dispersion of the Industrial Internet of Things and it has a key role to enhance the end user experience. The emerging fog cloud computing architectural concept aims to diminish the experienced latency while simultaneously providing a seemingly unlimited quantity of computational power by moving computations...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
Recent distributed key-value data stores, such as Aerospike are getting the momentum with ever-increasing need for large-scale real-time data processing. While these data stores can provide significantly improved performance, they still struggle to meet Quality of Service (QoS) during workload surges. In this paper, we address the problem of QoS-aware resource allocation for burst workloads in key-value...
The rapid growth in market demands for high-quality, state-of-the-art, and reliable communication services increases the amount of session-control signaling, which is mainly based on the Session Initiation Protocol (SIP). Many research activities dealing with the Quality of Service (QoS) have been focused on media-related service components, whereas signaling-related service components have received...
Block traces are widely used for system studies, model verifications, and design analyses in both industry and academia. While such traces include detailed block access patterns, existing trace-driven research unfortunately often fails to find true-north due to a lack of runtime contexts such as user idle periods and system delays, which are fundamentally linked to the characteristics of target storage...
Message serialization is a format of messaging leveraging Web services to exchange data over the network. Serialized messages are processed at the server and sent as objects over the network to the client to be consumed. While, serialization process minimizes network bandwidth requirement but then incurs overhead at the communicating ends. This research contributes to the study of message exchange...
The economic aspects of peering and transit interconnections between ISPs have been extensively studied in prior literature. Prior research primarily focuses on the economic issues associated with establishing peering and transit connectivity among ISPs to model interconnection strategies. Performance analysis, on the other hand, while understood intuitively, has not been empirically quantified and...
P2P media streaming is the most renowned application on the web. In live media streaming nearest neighbor should discover as quick as possible. It is the most time constrained application to find nearest peer over the internet. Scalability, QoS and low latency are the objectives of media streaming. To achieve these objectives a system is needed which speedily and perfectly finds the nearby peer by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.