The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multipath TCP (MPTCP) has gained great attention by the researchers and network application developers due to its features providing better bandwidth utilization and higher reliability recently. Utilizing MPTCP in the datacenters provides performance gain to the applications. If the underlying network has Software Defined Networking (SDN) architecture, the routing of the MPTCP subflows can be specialized...
The Extensible Messaging and Presence Protocol (XMPP) is one of the most popular Instant Messaging (IM) protocols which uses a client-server working mode. This protocol uses different connection primitives for both client-to-server (c2s) and server-to-server (s2s) connections. It is actively used in mission-critical operations where the reliability and security of communication systems is always imperative...
This study investigates the effect of image rescaling and format changing hosted in a RESTful API architecture considering transfer time as a critical factor to apply lane detection on a external server. We employ Probabilistic Hough Transform to perform the detection because it is invariant to pixel position and robust to noise. Before being trasmitted to the external server, images are rescaled...
Mobile applications are usually developed in a native way, using languages and APIs specific for a given platform, hindering the portability. As an alternative, web technologies as JavaScript and PHP have been employed enabling a same implementation to be executed in different mobile platforms without any recompilation or recoding process. This paper compares the efficiency of Android applications...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
In recent times, mobile broadband networks are focused on bringing different capabilities to the edge of the mobile network. Mobile Edge Computing (MEC) addresses this issue by placing the compute and storage resources closer to the Radio Access Network (RAN), with an aim to reduce end-to-end latency, ensure better service delivery, and offer improved user experience. In this work, we propose SDEC...
Cheetah flows, which are high-rate flows, can cause increased packet delays and losses in other flows. Leveraging the flexibility offered by the NFV paradigm, our proposed Cheetah Flow Identification Network Function (CFINF) uses a novel method in which a new measure, short-duration flight rate, which is the rate of a flight of packets received over a fixed (short) time interval, is computed and compared...
The bursty many-to-one communication pattern, typical for data acquisition systems, but also present in datacenter networks, is particularly demanding for commodity TCP/IP and Ethernet technologies. We expand our study of building incast-resistant networks based on software switches running on commercial-off-the-shelf servers. In this paper we provide the estimates for costs and physical area required...
The emergence of 5G wireless and IoT (Internet of Things) technologies, as well as the continuous evolution of cloud computing is driving the need for easy and on-demand creation of end-to-end network services. We have developed an integrated system called the end-to-end network service orchestrator, which realizes seamless service orchestration across multiple on-premises and cloud infrastructures...
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and...
Virtual data centers (VDCs) are among competitive advantages offered to businesses by cloud computing. Through VDCs, organizations can use a pool of on-demand virtual infrastructures in the form of a data center without paying the up-front costs of an actual data center. With the advent of software-defined networks (SDNs), it is now possible to provide the VDC's tenants with overlay SDNs to cover...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
Recently, mobile broadband networks are focused on bringing additional capabilities to the network edge. For instance, Mobile Edge Computing (MEC) brings storage and processing capabilities closer to the mobile user i.e., at the radio access network, in order to deploy services with minimum delay. In this paper, we propose a resource constrained cloud-enabled small cell that includes a MEC server...
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
Virtualized network function (VNF) service chaining in optical datacenter networks (DCN) is a more complex problem than that in packet-switched networks, as it introduces additional constraints related to the optical network. For example, in an optical DCN one needs to make sure that optical network resources are efficiently utilized, which requires multiplexing of several VNF chains to fill the optical...
Modern companies can't operate and conduct business without using a developed and stable functioning information system, which includes a network. To monitor network performance characteristics of network traffic are often defined, the values of them determine the performance of the network. Mostly these characteristics values vary slightly within predetermined time intervals. A significant change...
Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers...
With the rapid increase in data and its complexity of configuration and deployment bring a new challenge to the research community. In this scenario, automatic Hadoop cluster deployment and management tool provide a new horizon which plays a vital role in resource and packet management in distributed environment. This paper describes a low-cost Automatic Hadoop Cluster Deployment and Management tool...
This Waste management is a major issue for rapidly growing megacities in developing countries. Unorganized and poor management system leads towards negative environmental impact, and lowering livability of these cities. How-ever, there are scope for integrating general people in the waste management to improve overall performance. In such context, the aim of this study is to develop and detail, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.