The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e. sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings...
Kernel patches are released frequently to fix bugs and security vulnerabilities. However, users and system administrators often delay installing these updates because they require a system reboot, which results in disruption of service and the loss of application state. Unfortunately, the longer a system remains out-of-date, the higher is the likelihood of system failure or a successful attack. Approaches,...
Internet is an ever-growing network. The network equipment has to be improved to cope with this growth, including those devices used to classify the network traffic. Internet service providers and network operators require to apply different QoS policies for specific protocols. Then, such classifying systems are critical. However, classification by port does not provide good results, and it is necessary...
Nowadays, due to excessive queuing, delays on the Internet can grow longer than several round trips between the Moon and the Earth — for which the “bufferbloat” term was recently coined. Some point to active queue management (AQM) as the solution. Others propose end-to-end low-priority congestion control techniques (LPCC). Under both approaches, promising advances have been made in recent times: notable...
Ultra low-latency networking is critical in many domains, such as high frequency trading and high performance computing (HPC), and highly desirable in many others such as VoIP and on-line gaming. In closed systems — such as those found in HPC — Infiniband, iWARP or RoCE are common choices as system architects have the opportunity to choose the best host configurations and networking fabric. However,...
The Single System Image (SSI) clustering technology hides the distributed nature of the participating resources, and makes them appear as a single homogeneous computing resource to the user. An SSI cluster can utilize all the available processing power and memory from its participating resources. However, using the current implementations, an SSI can only be formed using nodes which are within one-hop...
Voice and multimedia communications are rapidly migrating from traditional networks to TCP/IP networks (Internet), where services are provisioned by SIP (Session Initiation Protocol). This paper proposes an on-line filter that examines the stream of incoming SIP messages and classifies them as good or bad. The classification is carried out in two stages: first a lexical analysis is performed to weed...
An earlier investigation on leader-follower consensus protocols for double integrators with multiple time delays [1] is revisited in this paper from two completely different and novel perspectives. First, the crucial stability analysis of time delayed system is replaced with a recent technique called the Cluster Treatment of Characteristic Roots (CTCR). CTCR paradigm is pursued after a block-diagonalization...
This paper describes a technical problem of obtaining a unique SDL entity identifier using SDL/SystemC co-modeling. The problem occurs during scientific research in co-modeling field as well as work under real projects. Solution consists in redefinition the standard function of SDL simulation kernel for getting access to entity name and then conversion its name to a unique identifier. The paper explains...
TCP is the ubiquitous transport protocol in the Internet. However, in a wireless ad-hoc environment where links are unreliable, TCP causes a number of performance issues. The key reason behind this is that TCP considers all packet losses to be due to congestion and reduces its send rate, which is not necessarily appropriate in a lossy ad-hoc environment. In prior work, we have designed Loss Tolerant...
Various services, such as streaming, network games and thin clients, which keep a session state of user equipments (UEs) for a long period, are provided from servers. This paper proposes a session state migration which relocates session states from one server to multiple servers where the service of the relocated session state succeeds to be processed. Distributing the session states into the multiple...
Collective communication operations in the Message Passing Interface (MPI) consume a significant amount of time at scale, degrading the performance of scientific applications. Optimizing collectives is key to application performance and scalability. This paper focuses on hiding the latency of the all gather collective by efficiently offloading it to the networking hardware. We have investigated the...
Traditionally, Logical Processes (LPs) forming a simulation model store their execution information into disjoint simulations states, forcing events exchange to communicate data between each other. In this work we propose the design and implementation of an extension to the traditional Time Warp (optimistic) synchronization protocol for parallel/distributed simulation, targeted at shared-memory/multicore...
With the deep research to the packet filtering technology, this paper designs the double filtering technology program combining NDIS intermediate driver filter technology with SPI interface filter technology. It implements the system architecture and function module for the mixed firewall, proposes the mixed protection method based on the combination of user and kernel mode, and uses database to achieve...
This paper presents Caliper, a highly-accurate packet injection tool that generates precise and responsive traffic. Caliper takes live packets generated on a host computer and transmits them onto a gigabit Ethernet network with precise inter-transmission times. Existing software traffic generators rely on generic Network Interface Cards which, as we demonstrate, do not provide high-precision timing...
Architectures in which multicore chips are augmented with graphics processing units (GPUs) have great potential in many domains in which computationally intensive real-time workloads must be supported. However, unlike standard CPUs, GPUs are treated as I/O devices and require the use of interrupts to facilitate communication with CPUs. Given their disruptive nature, interrupts must be dealt with carefully...
Monitoring equipment used in hospital wards that most of the networking capabilities,Most of the cable, so that the hospital must consider the routing problem,and health care workers in the process of care patients of ward rounds not only time-consuming and inefficient. To solve these problems, combined with the ZigBee network technology to design a new type of medical monitoring system. In this paper,...
In this paper, we present the design, implementation, and software testing of USBSec, a secure extension of the vanilla USB protocol that incorporates host authentication to defend against software threats. Specifically, we force the USB host to supply authentication information to the peripheral device \emph{before} enumerating the device. The peripheral validates the authentication information against...
Today's largest High Performance Computing (HPC) systems exceed one Petaflops (10^15) floating point operations per second) and exascale systems are projected within seven years. But reliability is becoming one of the major challenges faced by exascale computing. With billion-core parallelism, the mean time to failure is projected to be in the range of minutes or hours instead of days. Failures are...
User Program has significant percentage of memory requests that target only private data, which does not need to resolve cache coherence conflicts. Yet traditional coherence protocol does not distinguish between shared and private blocks, which leaves much optimization space for memory reference latency and power consumption. This paper proposes an optimized cache coherence protocol, called PMESI,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.