The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We show that the relative usage of the different attributes of a cloud server can be estimated under time-varying loads. We demonstrate the effectiveness of these estimators by determining how user requests for video-from a video server-affects its usage. Relative Attribute Usage (RAU) estimators are designed by (1) formulating a generative model for the server attributes; (2) using the fact that...
We study the online load balancing problem for two independent criteria in heterogeneous systems. For convenience, we choose a system of distributed file servers located in a cluster as the scenario, although our work is not limited to it. Every server is assigned upper bounds for its load and storage space. We assume that the heterogeneity of servers is eventually reflected by the difference of these...
In this paper, we present Productive Puzzles, a novel puzzle mechanism for defending against Distributed Denial of Service (DDoS) attacks. Productive puzzles aim to use tasks from real applications and services — as opposed to repetitive cryptographic computations that only serve the security purpose — as the work to be completed by the client, therefore making meaningful use of the client resources...
In this paper, we present Productive Puzzles, a novel puzzle mechanism for defending against Distributed Denial of Service (DDoS) attacks. Productive puzzles aim to use tasks from real applications and services — as opposed to repetitive cryptographic computations that only serve the security purpose — as the work to be completed by the client, therefore making meaningful use of the client resources...
In order to make the performance of Electrical Engineering Virtual Lab meet growing customer demand, this paper makes an improvement on the architecture of load-balancing cluster on Linux Virtual Server, and proposes a genetic optimized BP neural network algorithm to improve the currency performance and stability of the cluster.
Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk...
Performance assessment of cloud-based applications requires new methodologies to deal with the complexity of software systems and the variability of cloud resources. In this paper, we address the problem of reducing the total costs for running cloud-based applications while fulfilling service-level objectives (SLOs). To this end, we define an approach to refactor a cloud application in such a way...
Over the past years, organizations have been moving their enterprise applications to the cloud with the aim of reducing infrastructure ownership and maintenance costs, and to take advantage of the elasticity and heterogeneity of the cloud. This paper joined the approaches of multi-cloud deployment using CloudML and identifying the ideal resource provisioning and deployment configuration using an optimization...
Priority control is important in information systems that are designed according to SOA because there are services which have different functions and qualities, and a large amount of concurrent service requests may also occur at some point. A message scheduling model based on priority control of the service consumer is proposed. By adding an overall control queue between service consumers and service...
Recent technological advances in the telecommunications industry have led to discovering the limitations of traditional communication networks and, in this context, to the emergence of a new paradigm that tries to mitigate them, namely Software Defined Networking (SDN). When it appeared, it was associated only with the OpenFlow protocol, as a southbound interface. However, the recent trend in the...
. In this paper, we proposed a new Energy Aware Load-Balancing Architecture (E-Balance) which balances the load across the network and it decreases energy consumption. Foremost of all, we proposed an optimal system model. And so, we figured out our system model by optimization solver. The optimal model had two grave problems: computation complexity and the demand for a global vision of network status...
In CONs (Content-Oriented Networks), a router can have multiple entries for the same content name when multiple repositories produce the same content. This is the inherent feature of CONs that users do not care about the places of contents servers. When an Interest packet finds multiple entries at a router on a path, a routing strategy of the router plays a very important role for effective content...
The occupancy of the pending interest table (PIT) in content-centric networks (CCN) and other information-centric networking (ICN) architectures has an undeniable effect on the congestion level and the performance of the network. Each interest packet forwarded upstream by a node results in at most one data packet arriving back at the node and being possibly forwarded to many interfaces downstream...
New flexible network environments emerged in the last years, such as the Software-Defined Networks, the Network Function Virtualization and the various network slicing technologies. Their main goal is to satisfy and to flexibly cope with the changing requirements of both users and service / infrastructure providers with respect to the constraints of physical resources, the frequently changing network...
Service-Oriented Architectures can experience a highly diversified and complex set of interactions between web services for them to compute a response to an incoming service request. Existing approaches based on modelling and control theory are good for strategic and long-term development of a data center resource dimensioning necessary to respond within the boundaries of Service Level Agrements....
As of 2010 data centers use 1.5% of global electricity production and this is expected to keep growing [1]. There is a need for a near real-time power consumption modeling/monitoring system that could be used at scale within a Software Defined Data Center (SDDC). The power consumption models and information they provide can then be used to make better decisions for data center orchestration, e.g.,...
Most businesses collect and store sensitive information about their work or related like project documents, audio data, video data etc. while sharing files in peer-to-peer system dynamically peer nodes can add may delete. Peer-to-Peer file sharing using P2P application architecture. Shared files will move between different nodes. P2P technology is using by popular services like Napster, Bit Torrent,...
Recently, Structure-from-Motion pipelines (SfM) for the 3D reconstruction of scenes from images were pushed from desktop computers onto mobile devices, like phones or tablets. However, mobile devices offer much more than just necessary computational power. A combination of handheld device with camera, display and full connectivity entails possibilities for an on-line 3D reconstruction that would have...
Migration of a virtual machine is basically moving the VM running on a physical machine (source node) to another physical machine (target node). It is done as, while the VM is running on the source node, and without disturbing any dynamic framework connections, indeed after the VM is moved to the target node. It is considered — live□, since the unique VM is running, while the migration is in progress...
Load balancing of large distributed server systems is a complex optimization problem of critical importance in cloud systems and data centers. Existing schedulers often incur a high communication overhead when collecting the data required to make scheduling decisions, hence delaying job requests on their way to the executing servers. We propose a novel scheme that incurs no communication overhead...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.