The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication plays a major role in the day to day activities of the world. Communication can be a gesture, phone call or by e-mail. This why most of the governments pay more attention to communication patterns and what people communicate with each other. In modern day information technology plays a major role in private and public sector events. It's better to be having implement security in to the...
File is a super abstraction of hypothetically huge volume of information stored in containers (disk blocks) which is persists for very long time (memory abstraction). File is linear Array of bites and blocks of bytes accessed by multiple clients which is controlled by File system. File System function is disk seek, read maximum information from container and maps file names and offsets to disk blocks...
Global warming has deconditioned people to rapid changes in temperature. Further, recently the incidence of warm nights has increased. In Japan, warm nights are often observed in the middle of August in Japan and cause loss of sleep and deconditioning. This problem is being discussed in Japan because such nights make it difficult for people to sleep well and consequently, they fall sick. In particular,...
Migrating legacy real-time software stacks to newer hardware platforms can be achieved with virtualization which allows several software stacks to run on a single machine. Existing solutions guarantee that deadlines of virtualized real-time systems are met but can only accommodate a reduced number of systems. Therefore, this paper introduces ExVM, a new scheduling framework to maximize the number...
We introduce manylogs, a simple and novel concept of logging that deploys many scattered logs on disk such that small random writes can be appended into any log near the current disk head position (e.g., the location of last large I/O). The benefit is two-fold: the small writes attain fast durability while the large I/Os still sustain large bandwidth.
The objective of the project was to develop an android based mobile application which is targeted to be used in MICE (Meetings, incentives, conferencing, and exhibitions) applications. A cloud server is set up and is integrated with an iBeacon. The application functions on an Amazon EC2 instance and all the data involved in the App is stored in the cloud database in the form of tables. An iBeacon...
This paper proposes a methodology for the establishing a honeynet in which host machine work as honeywall and thus take advantage of underlying architecture on which they are deployed. Such setup help to minimize the CPU and RAM load for running extra virtual machine for CDROM Roo. In this implementation various types of honeypots continue to run in virtual environment using Virtual Box as in case...
Network emulation strikes the balance between using real machines on full-fledged networks and running software models of applications and networks in simulation environments. Advanced Linux features make it possible to emulate entire networks on a single machine, enabling experiments that are much easier to run and repeat. However, some of these features were not designed with the primary purpose...
Security Information Event Management (SIEM) systems are used to monitor large networks for malware infestations, DDoS attacks, and many other types of network intrusions. Typical SIEMs are centrally managed with information flowing in from across the enterprise. In this architecture, as the enterprise grows, the SIEM must also scale proportionally. In our research we are working to create a Peer-to-Peer...
Data availability and reliability is very important along with the growth of information and communication technology services today. Needs of the powerful and affordable database system infrastructure to be the most considered thing by the application service provider. This paper presents the powerful and scalable database open source solution infrastructure which can be distributed across the data...
As the huge growth of mobile traffic amount, conventional Radio Access Networks (RANs) suffer from high capital and operating expenditures, especially when new cellular standards are deployed. Software, and cloud RANs have been proposed, but the stringent latency requirements e.g., 1 ms transmission time interval, dictated by cellular networks is difficult to satisfy. We first present a real software...
The Internet has grown quite quickly, requiring more and more processing power each year to handle user requests in a timely fashion. In the multicore world, the addition of server-side threads should help improve server performance. However, several studies have shown that this is not true, identifying the Linux kernel as the possible culprit. Our working hypothesis is that the kernel does not provide...
The purpose of this paper is to introduce and describe a new Ruby benchmarking tool. We will describe the background of Ruby benchmarking and the advantages of the new tool. The paper documents the benchmarking process as well as methods used to obtain results and run tests. To illustrate the provided tool, results that were obtained by running a developed benchmarking tool on existing and available...
The role of human sight becomes increasingly important as information technology progresses. Presentations based on multimedia help to explain many kinds of situations. However, this form of communication, so convenient for persons gifted with sight, is inaccessible to the visually impaired. Thus, persons lacking eyesight are eager for a method that can provide them with access to progress in technology...
This paper discusses the problems and disadvantages users have to deal with when they attempt to use the Single Sign On mechanism, in conjunction with the Kerberos V5 protocol as a means of authenticating users on Linux based environments. Some known incompatibilities and Security problems are exposed for which, today, native Single Sign On in Kerberos is not a standard in Linux. Finally, the future...
This document describes the different attacks that a WISP (Wireless Internet Service Provider) company is exposed to provide last mile services wireless, according to which it designs and implements a security policy based on the requirements and demands presented by this type of scenarios using Mikrotik equipment.
With the introduction of low power System on a Chip (SoC) processor architectures in enterprise server configurations, there is a growing need to develop the software that will support scale-out, data intensive cloud applications that are deployed in data centers today. In this paper, we describe the design and implementation of a low latency user space fully compliant TCP/IP socket stack on a low...
One of the central building blocks of cloud platforms are linux containers which simplify the deployment and management of applications for scalability. However, they introduce new risks by allowing attacks on shared resources such as the file system, network and kernel. Existing security hardening mechanisms protect specific applications and are not designed to protect entire environments as those...
In typical IP network, load balancing is adopt to enable the load of all servers approach a global optimal balanced by dynamically dispatching new flows to different servers in the network. Linux Virtual Server (LVS) plays an important role in the dispatching process. However, previous LVS-based researches have failed to consider expansibility, efficiency and security. Based on this, we proposed a...
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.