The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Triggered by several head-mounted display (HMD) devices that have come to the market recently, such as Oculus Rift, HTC Vive, and Samsung Gear VR, significant interest has developed in virtual reality (VR) systems, experiences and applications. However, the current HMD devices are still very heavy and large, negatively affecting user experience. Moreover, current VR approaches perform rendering locally...
Cloud Services have become an important part of the business world. Although public cloud services provide a range of advantages, it also creates concerns over security, network usage and the need for technical expertise in the management of the cloud. This paper describes a local private cloud which uses on-site hardware infrastructure and which incorporates a three tier management system. This device...
Smart-home is becoming increasingly popular in recent years, and it introduces a new content retrieval paradigm - delay-insensitive downloading. In this new paradigm, users do not require the content retrieval task to finish as soon as possible, but only set a deadline for it. We study the role of this paradigm in the traffic engineering of a chunk-based cloud storage service. We propose that it could...
Datacenters should provide bandwidth guarantees to tenants for performance predictability. Ideally, this process should attain three important characteristics: work conservation, fairness, and simplicity. The first one indicates that tenants can utilize unused bandwidths effectively without harming the bandwidth guarantee. The second one means that tenants share the unused bandwidth following a certain...
Cloud computing has emerged as an important paradigm to improve resource utilization, efficiency, flexibility, and the pay-per-use billing structure. However, cloud platforms cause performance degradations due to their virtualization layer and may not be appropriate for the requirements of high-performance applications, such as big data. This paper tackles the problem of improving network performance...
The offers on cloud computing infrastructure have focused on providing computing and storage resources, and consider the network mostly as a required add-on and not truly as a resource itself. However, the need to have more robust solutions is becoming clearer. This paper argues that cloud infrastructure services will evolve and allow the definition of complete infrastructures that comprise both computing...
Network service providers have to cope with the growing on-demand need from end-users as well as the diversity of usage. The softwerization and cloudification of the network components offer an interesting solution to achieve the agility necessary to dynamically match the requirement with the level of resource consumption. This materializes with the deployment of Network Functions Virtualization (NFV)...
Many online application services are now provided by cloud-deployed VM clusters. Although economical, VMs in the cloud are prone to interference due to contention for physical resources among colocated users. Worse, this interference is dynamic and unpredictable. Current provider-centric solutions are application-oblivious and are thus not always aware of the user's SLO requirements or application...
Deploying composite applications to Fog nodes in a QoS- and context-aware manner is challenging due to the heterogeneity, scale and dynamicity of Fog infrastructures.
Today, in the cloud computing context, the network is starting to arise as a true resource itself and not just as a required connectivity add-on. The ability to define network resources (e.g. routing/switching elements, bandwidth) in this context is still scarce, but there are clear evidences that this is a future reality. In this article, we consider that cloud infrastructure services will allow...
Internet of Things (IoT) traffic will become increasingly heterogeneous not only in terms of traditional metrics as required bandwidth and maximum latency, but also in terms of functional requirements such as compute power and temporary storage. Sophisticated planning and engineering approaches must be adopted by service providers to account for this heterogeneity, inherent in IoT applications. Metropolitan...
The proliferation of mobile devices and ubiquitous access of the wireless network enables many new mobile applications such as augmented reality, mobile gaming and so on. As the applications are latency sensitive, researchers propose to offload the complex computations of these applications to the nearby mobile edge cloud, in order to reduce the latency. Existing works mostly consider the problem...
This paper proposes a fully distributed scheduling algorithm to process MapReduce data-intensive applications across geo-distributed clusters in federated clouds. The proposed algorithm, called FedSCD, takes advantage of data locality while reducing both VM cost and data transfer cost (between clusters) subject to Deadline constraint. This work is compared to conventional partially distributed scheduling...
Imprecise input data imposes special challenges to workflow scheduling. This paper introduces a robust scheduler based on particle swarm optimisation, called RobWE, which considers uncertainties of available bandwidth when producing schedules for workflow ensembles. The proposed scheduler is also a flexible scheduler since it allows the replacement of its objective function according to the user's...
This paper deals with virtualised Network Function Placement and chaining over cloud and NFV environments. We propose a polynomial-time algorithm for joint VNF chain placement that is based on a recursive optimization approach. The key idea is to benefit from the robustness of the recursion paradigm that was used to solve many optimization problems. We demonstrate the potential of our solution by...
Software-defined networking (SDN) has separated control and forwarding planes, which is a powerful approach to enable network virtualization by SDN hypervisors to share physical SDN networks among multiple virtual SDN in cloud data center. However, the centralized control and virtual network shared physical network are delicately weak and easy to failure if virtual topology embedding is not properly...
Existing coflow scheduling frameworks effectively shorten communication time and completion time of cluster applications. However, existing frameworks only consider available bandwidth on hosts and overlook congestion in the network when making scheduling decisions. Through extensive simulations using the realistic workload probability distribution from Facebook, we observe the performance degradation...
The commonly existing employed centralized algorithms fail to be adaptive to the new storage pattern on mobile edge cloud. To address this issue, we propose an alternating-direction-method-of-multipliers-based collaborative storage algorithm called MECCAS (Mobile Edge Cloud Collaborative Storage). The proposed MECCAS is able to minimize the delay of task execution and total costs for the overall operation,...
Abstract-Internet of Things (IoT) is emerging as part ofthe infrastructures for advancing a large variety of applicationsinvolving connection of many intelligent devices, leadingto smart communities. Due to the severe limitation on thecomputing resources of IoT devices, it is common to offloadtasks of various applications requiring substantial computingresources to computing systems with sufficient...
We study the scenario of hybrid cloud storage where the client utilizes both an off-site and a local storage. The former is a distributed storage system (DSS) with the presence of an eavesdropper that has access to the content stored in and downloaded to some subset of nodes. The latter (local) storage is utilized to store a secret key to secure the stored file against the eavesdropper. We introduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.