The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's economic conditions, engineers are faced with the problem of designing complex distributed computer systems under tight deadlines. Ensuring high reliability and robustness of such systems requires redundancy of their structure as well as the processes of data transmission and handling. The purpose of this study is to create simulation models and means to support computer-aided design of...
New model of multi-layer service network is discussed in the paper. Each server or any group of servers of a given layer of an hierarchical queuing network may be a customer in queuing systems of next layer. Conception of hypernet uses for representing structure of such multi-layer network, which we name as Q-hypernet. Some typical cases of Q-hypernet with possible applications are discussed along...
A number of benefits originate from the implementation of cloud computing. Cloud computing has been extensively implemented in organizations like companies and universities. However, in Indonesia cloud computing is not widely approved by universities yet. This condition can be caused by lack of trust of the universities in the risk of cloud computing implementation. This paper is intended to analyze...
This research provides a concise answer to how to organize a strong infrastructure of information technologies for high availability based on open source software, it's necessary for large organizations to provide high availability, the work will focus on explaining the procedures to provide services for users 24 hours the 365 days. Centralization is a major weakness today because is the only source...
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are described. Implications of current European Union legislation, the new General Data Protection Regulation, for the security and reliability of healthcare IoT systems and for the privacy of users of these systems are presented. Analytics of healthcare IoT data for the requirements of evidence based healthcare...
An effective storage and management of file systems is very much essential now a days to avoid the wastage of storage space provided by the cloud providers. Data de-duplication technique has been used widely which allows only to store a single copy of a file and thus avoids duplication of file in the cloud storage servers. It helps to reduce the amount of storage space and save bandwidth of cloud...
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them as reliable, instantaneous, and distributed attack infrastructure. However, there is a lack of complete understanding of such domain name abuses and the...
Commodity HardWare (CHW) is currently used in the Internet to deploy large data centers or small computing nodes. Moreover, CHW will be also used to deploy future telecommunication networks, thanks to the adoption of the forthcoming network softwarization paradigm. In this context, CHW machines can be put in Active Mode (AM) or in Sleep Mode (SM) several times per day, based on the traffic requirements...
The cloud computing system (CCS) is with large scale and complex structure. Benefited from its enabling technology, virtualization, the CCS has the characteristics of elastic, providing on-demand service according to resource scheduling strategy. Different resource scheduling strategies lead to different operation hours, which have different effects on the reliability of cloud computing infrastructure...
DNS is one of the important names in web-based information technology that allows users to be able to browse the desired information. DNS service has some similarities with a list of phone book that stores telephone numbers and addresses. To perform the function, the DNS service configured on a special machine that serves the request is a DNS Server. The reliability and accuracy of a DNS server in...
In the past few years, datacenter (DC) energy consumption has become an important issue in technology world. Server consolidation using virtualization and virtual machine (VM) live migration allows cloud DCs to improve resource utilization and hence energy efficiency. In order to save energy, consolidation techniques try to turn off the idle servers, while because of workload fluctuations, these offline...
The trend of producing energy from Renewable Generation (ReGen) plants is greatly increasing. This leads to the objective of building future power generation system entirely based on renewable sources. Since the power output of ReGen plants, such as wind power plants (WPP), varies continuously and thereby the voltages in the distribution grid, an effective control system is required, to govern the...
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
Recently, spoofed e-mails become sophisticated and the messages that cannot be identified by visual confirmation have been increasing. DKIM is one of the most famous methods as countermeasure of spoofed e-mail. However, since DKIM allows a signature by third party domains, a recipient server can be unable to determine whether the attached signature is the legitimate. To solve the problem, although...
With the growing popularity of Internet of Things (IoT) services being applied in several aspects of real-life applications, performance has become an important requirement. Meanwhile, the techniques for reliability enhancement such as virtual machine migration and recovery also have significant impact on end-to-end performance. This paper proposes a predictive approach of reliability-aware performance...
Secure deduplication using convergent encryption eliminates duplicate data and stores only one copy to save storage costs while preserving the security of the outsourced data. However, convergent encryption produces a number of encryption keys, of which size is linear to the number of different data. Although a deduplication scheme has been proposed for efficient convergent key management recently,...
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications because of the inherently dynamic nature of IoT data. The available frameworks of data integrity verification with public auditability cannot avoid the Third Party Auditors (TPAs). However, in a dynamic environment, such as the IoT, the reliability of the TPA-based frameworks is far from being satisfactory...
Compared with today’s 4G wireless communication network, the next generation of wireless system should be able to provide a wider range of services with different QoS requirements. One emerging new service is to exploit cooperative driving to actively avoid accidents and improve traffic efficiency. A key challenge for cooperative driving is on vehicle-to-vehicle (V2V) communication which requires...
A proximity-based service (PBS) leverages the estimated proximity to provide users the accessibility to object or location restricted service. This paper exploits the interaction between Bluetooth Low Energy (BLE) Beacon and smartphone to set forth the fundamental building block of a beacon-based PBS system. In real-world scenarios, a beacon-based PBS system might suffer from sparse conditions when...
Cloud computing platforms provide easy and transparent access to a company's storage infrastructure through services. Commonly known as Storage as a Service (STaaS), it allows users to store their data at remote disks and access them anytime from any place. On the other hand, with the deployment of Electronic Document Management (EDM) to manage the insertion, sharing, and retrieval of information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.