The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of...
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive...
Network virtualization and SDN-based routing allow carriers to flexibly configure their networks in response to demand and unexpected network disruptions. However, cellular networks, by nature, pose some unique challenges because of user mobility and control/data plane partitioning, which calls for new architectures and provisioning paradigms. In this paper, we address the latter part by devising...
HTTP Adaptive Streaming is a successful and largely adopted content delivery technology. Yet poor bandwidth prediction, notably in mobile networks, may cause bit-rate oscillations, increased segment delivery delays, video freezes, and may thus negatively impact the end user quality of experience. To address this issue, we propose to exploit the stream prioritization and termination features of the...
This paper addresses the problem of service function chaining in a network. Currently, problems of chaining services in a network (i.e., service function chaining) can be broadly categorised into middlebox placement in a network and packet steering through middleboxes. In this work, we propose a One Pass Packet Steering (OPPS) approach for use in multi-subscriber environments, with the aim of reducing...
Due to the expensive hardware and complex management of the traditional middlebox, a concerted effort towards the virtualized middlebox has been launched in both academia and industry. In this paper, we propose a unified middlebox model, MBBrick, which is composed of three operation modules (classifier, rewriter, forwarder) and a control module (the mcontroller). We then design a language, MG, to...
5G operators will utilize mobile edge computing (MEC) to shorten transmitting latency and fulfill the requirements of increasing mobile applications for high bandwidth and ultra-low latency. A mobile online system (MOS) supports mobile online applications to trigger events in the mobile devices, refresh data, and maintain data consistency in the clouds. As users run mobile online applications, a MOS...
Building on the adoption of the Network Functions Virtualization (NFV) and Software Defined Networking (SDN) paradigms, 5G networks promise distinctive features including the capability to support multi-tenancy. Virtual Network Operators (VNOs) are expected to co-exist over the shared infrastructure, realizing their network functionality on top of virtualized resources. In this context, we observe...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
Real-time deferrable server (RTDS) scheduler is presented since Xen 4.5. Under RTDS, a guaranteed physical CPU capacity is provided to every virtual CPU so that the performance can be better predicted. However, the guaranteed capacity is defined off-line, it might not fit the requirement of a virtual CPU at the run-time. In this paper, an RTDS-based CPU scheduler is proposed, called enhanced real-time...
The Internet of Things (IoT) paradigm is expected to bring ubiquitous intelligence through new applications in order to enhance living and other environments. Several research and standardization studies are now focused on the Middleware level of the underlying communication system. For this level, several challenges need to be considered, among them the Quality of Service (QoS) issue. The Autonomic...
Server virtualization is one of the critical cloud computing technologies since it enables the use of software-based virtual machines (VMs). Many enterprises have already adopted this technology to build their cloud platforms because of its scalability and flexibility. However, high availability (HA) remains a challenging issue on such a virtualized cloud platform. That is, the time for VM failover...
Current network switches cannot be programmed and flexibly controlled. Then, developers of a data center application system, which is composed of software and computers connected with a network, are not able to optimize behavior of network switches on which the application is running. On the other hand, Deeply Programmable Network (DPN) switches can completely analyze packet payloads and be profoundly...
Printing good-sized complicated practical report forms is one puzzle in application system with B/S architecture. In order to solve this problem, performing data exchange using XML to come true printing is explored. Windows Form in the framework of .NET is embedded in FrontPage. By self-programming, XML document is analyzed and client-side printing is controlled. Fundamental technique on implementing...
In response to the growing demand for power and energy across US and world-wide, development of energy efficient solutions has become very important. Considering data center applications, cooling power consumption constitutes a significant part of the overall energy usage of the system. In the process of optimizing the energy consumed per performance unit, liquid cooling has become one of the key...
The effective use of embedded radial expanding micro-channels with micro-pin fields for two phase cooling of semiconductor dies has been demonstrated [1, 2]. In this second part of a two part paper, the functional results of integrating this approach into a high performance server are presented. First, a number of microprocessor modules were fully characterized within a high performance server utilizing...
Motivated by applications in competitive WiFi sensing, and competition to grab user attention in social networks, the problem of when to arrive at/sample a shared resource/server platform with multiple players is considered. Server activity is intermittent, with the server switching between ON and OFF periods alternatively. Each player spends a certain cost to sample the server state, and the per-player...
Wikipedia is one of the most popular information platforms on the Internet. The user access pattern to Wikipedia pages depends on their relevance in the current worldwide social discourse. We use publically available statistics about the top-1000 most popular pages on each day to estimate the efficiency of caches for support of the platform. While the data volumes are moderate, the main goal of Wikipedia...
To simulate a realistic game server environment, we utilized open source software libraries to create automated players (bots) for the globally renowned online game: Minecraft. The fairly simple design of the Minecraft server as well as its massive development and support community facilitates considerable research and analysis prospects. As such, the goal of our investigation was to emulate and then...
Oracle's Real Application Cluster (RAC) allows multiple database instances to run on different server nodes in a cluster against a shared set of data files. A critical aspect of an Oracle RAC system is that of instance recovery. When a node suffers from a hardware failure, or a database instance suffers from a software failure, instance recovery is performed by a surviving instance to ensure that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.