The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Almost all DNS queries that traverse Internet are transported via UDP in self-contained small packages. Therefore, with no restriction of packet ordering, the intuition would say that adding thread-based parallelism to the servers will increase their performance, but it does not. This paper studies the problem of serialized access to UDP sockets, and states the problem in the way the packets are enqueued...
The Minos+ experiment is an extension of the Minos experiment at a higher energy and more intense neutrino beam, with the data collection having begun in the fall of 2013. The neutrino beam is provided by the Neutrinos from the Main Injector (NuMI) beam-line at Fermi National Accelerator Laboratory (Fermilab). The detector apparatus consists of two main detectors, one underground at Fermilab and the...
Cloud computing infrastructures will likely be a key component of future Internet architectures, owing to the many advantages of server and network virtualization, especially considering the emerging Network Function Virtualization and Software Defined Networking technologies. The cloud infrastructure will then determine the performance of the networking environment. In this paper, such issue is investigated...
Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in providing an enterprise's IT services. However,...
We present a live migration solution based on Proxy Mobile IPv6 (PMIPv6), a light-weight mobility protocol standardized by IETF. PMIPv6 handles node mobility without requiring any support from the moving nodes. In addition, PMIPv6 works with IPv4, IPv6 and dual-stack nodes. Our results from a real testbed show that network connectivity is successfully maintained with little signaling overhead and...
Cloud computing model along with virtualization enables scalable infrastructures and provides on demand access to computing resources. Virtualization technology facilitates multiple virtual servers to run on a physical server to enhance the utilization of the server. Hypervisor as a virtualization layer provides an infrastructural support to multiple virtual machines above it by virtualizing hardware...
Quality of Experience (QoE) is defined as the overall acceptability of an application or service, as perceived subjectively by the end user including the complete end-to-end system effects. That means QoE may be influenced by the user expectations and context, adding a subjective component to measurements. Nevertheless, it has been studied that some metrics of Quality of Service (QoS), more related...
When a software system starts behaving abnormally during normal operations, system administrators resort to the use of logs, execution traces, and system scanners (e.g., anti-malwares, intrusion detectors, etc.) to diagnose the cause of the anomaly. However, the unpredictable context in which the system runs and daily emergence of new software threats makes it extremely challenging to diagnose anomalies...
Given the current situation on the Internet, it is important to determine the trust of the communication routes between a client and server. Such determination can only be established by end terminals such as clients and servers, not by intermediate routers or network providers so far. The revelations regarding PRISM and other programs highlight the importance of this issue. In this paper, a method...
This paper designed a circuit breaker on-line monitoring system based on S3C2440A core controller. With the high speed and high precision extended A/D, this device can sample signals on real time. It is fast, easy networking and convenient for remote data transmission by Ethernet. The embedded linux operating system, which can be cut arbitrarily and easy to translate, is used in this device. This...
The Domain Name System belongs to the core services of the Internet infrastructure. Hence, DNS availability and performance is essential for the operation of the Internet and replication and load balancing is used for the root and top level name servers. This paper proposes an architecture for credit based server load balancing (SLB) for DNS. Compared to traditional load balancing algorithms like...
This paper studies a system of video surveillance based on ARM, which detects mobile objects dynamically, whose purpose is to protect the safety of special places. It uses the S3C2416 processor as the core of the whole system to design circuit and software; and it uses open source program to detect whether there is an object is moving dynamically or not; it will alarm and automatically capture images...
The present work focused on the inclusion of social components to the Open Course Ware (OCW) platforms, with this purpose was taken as case study the Technical University of Loja (UTPL), to demonstrate the level of knowledge and use social networks and platforms OCW identifying acceptance and feasibility of integrating social platforms this kind of functionality. Based on the results obtained are...
Achieving high I/O throughput on modern servers presents significant challenges. With increasing core counts, server memory architectures become less uniform, both in terms of latency as well as bandwidth. In particular, the bandwidth of the interconnect among NUMA nodes is limited compared to local memory bandwidth. Moreover, interconnect congestion and contention introduce additional latency on...
This paper designed a remote video surveillance system, Which used a high-performance Cortex-A8 core board, with Samsung S5PV210 as the main processor, and combined ARM embedded development platform, in the Linux operating system, used a MJPG-streamer video server software. This design on the basis of porting the Linux operating system, and capturing the images by the USB camera, and on the basis...
Computer security, school security policy and school computers usability should be important for all school computers and network resources users. But instead of implementing security policy, users often unintentionally compromise computer functionality and security out of ignorance or negligence. Since Windows is the default operating system in the majority of Croatian schools, students often have...
The prospect of simpler infrastructure management and affordability has garnered interest in cloud computing from bioinformaticians. However, the performance cost of adopting such an infrastructure model for bioinformatics is not fully known. In an effort to help quantify this performance cost, we ran synthetic benchmarks and measured the runtimes of two short-read alignment applications on cloud-like...
In this paper we report an investigation on potential session multipathing strategies that leverage the easy deployment of user space-based protocols. We devised an experimental session layer architecture to deal with multipathing and we implemented such architecture with 4 different libraries of asynchronous I/O processing for Linux systems: Epoll, Posix Threads, Posix AIO, and Libev. We discuss...
Virtualization finds wide application in information and communication technology. Some of these applications can be used in education, to simplify the administration and teaching performance while saving money. In the last few years, computer technology has progressed sufficiently thus facilitate the development of virtual machines that provide a completely new method of using computers and their...
We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of the target binary or source code, against services that restart after a crash. This makes it possible to hack proprietary closed-binary services, or open-source servers manually compiled and installed from source where the binary remains unknown to the attacker. Traditional techniques are usually...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.