The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advances in fiber-optic technology and wavelength division multiplexing technique have led to the adoption of optical networks into cloud data centers to meet the ever-growing traffic demands. The hybrid optical-electrical data center network architecture becomes a transition solution from the all-electrical network architecture to the all-optical one since it is efficient in terms of the operational...
This paper focuses on placement and chaining of virtualized network functions (VNFs) in Network Function Virtualization Infrastructures (NFVI) for emerging software networks serving multiple tenants. Tenants can request network services to the NFVI in the form of service function chains (in the IETF SFC sense) or VNF Forwarding Graphs (VNF-FG in the case of ETSI) in support of their applications and...
E-Healthcare system plays a major role in the society. It monitors the health condition and helps in giving appropriate medical treatments. This system aims at gathering and storing patient's details and sharing health related information. It also has high legitimate concerns about patient's privacy and information security. This system minimizes the infrastructural barriers for the developing nations...
Internets of Things (IoT) are network of interconnected devices and communicate through internet. IoT constitutes huge number of heterogeneous devices and is prone to many issues. Devices in IoT senses enormous information that needs lots of network resources. In this work we have designed a Fuzzy Interference System (FIS) for classification of the jobs in to emergent and non-emergent jobs at local...
We propose an analytical framework for service oriented computing in Internet of Thing scenarios to derive an optimal performance from an elastic extensible cloud that can serve a request from access, edge and core network. If the number of replicas at different levels (access networks, edge networks and core networks) are maintained according to the values derived from our analysis, then the drop...
Routing a given set of flows with bandwidth requirements is a fundamental problem, which has been formulated as Unsplittable Flow Problem (UFP). One of the key issues in this formulation is that the bandwidth requirement is fixed for each flow. In practice, however, many applications (e.g., video-on-demand, backup and replication services) would greatly benefit from getting more bandwidths beyond...
Cost-effective cloud storage services attract users with their convenience; there is a trade-off between the service availability and the usage cost. We develop two cloud provider selection models for cloud storage services to minimize the total cost of usage. The models select multiple cloud providers with considering unavailability to meet the user requirements. The first model, called a user-copy...
Data centers play an important role with the fast growth of cloud computing used in our daily life. Traditional data center networks based on the fat-tree topology have their own drawbacks and limitations which prevent them from providing high performance to satisfy the increasing demand for cloud services. In this paper, we first design a new flexible network fabric for data center networks based...
A linear block code with dimension k and length n is called a locally repairable code (LRC) with locality r if it can retrieve any coded symbol by at most r other coded symbols. LRCs have been recently proposed and used in practice in distributed storage systems such as Windows Azure Storage and Facebook HDFS-RAID. Theoretical bounds on the maximum locality of LRCs have been established, and optimal...
Complete data center failures may occur due to disastrous events such as earthquakes or fires. To attain robustness against such failures and reduce the probability of data loss, data must be replicated in another data center sufficiently geographically separated from the original data center. Implementing geo-replication is expensive as every data update operation in the original data center must...
A new approach to implementation of the virtual network embedding strategy over OpenStack cloud platform presented. We presented the OpenStack cloud platform and the problems associated with virtual network embedding. Then, conduct OpenStack dashboard customization to generate virtual network requests to process these requests. We modified OpenStack Compute module to provide bandwidth limitation for...
Cloud data center is becoming more and more important for tenants because cloud resources and associated services can be shared by multi-tenant. Although resource isolation and traffic control, which are effective ways to protect the QoS of tenants, have been used extensively, the topology of the network needs to be further studied extensively. In this paper, combining VN with SDN, a topology-aware...
The features like on-demand self service, rapid elasticity, measured service, broad network access has increased the popularity of cloud computing and has motivated the business organization to adopt the cloud as part of their IT services and solutions. Various statistics and survey has proved that the user-base of the cloud is increasing day by day, which has enforced the cloud service providers...
Bit Torrent protocol is widely used for file sharing in peer-to-peer systems. Also, many cloud environments utilizethis protocol. Despite many advantages, among which are goodscalability and performance, BitTorrent has also limitations. Toamend them, this paper proposes TManTorrent protocol — adistributed BitTorrent protocol, which replaces a tracker serverwith a gossiping mechanism, and promotes...
Mobile Cloud Computing allows offloading compute-intensive applications execution from resource-constrained mobile devices to more powerful computing resources, i.e., distant cloud servers or cloudlets. This is a challenging issue due to the situations that mobile users may face in such context such as the inconstancy of wireless networks, mobility, server load or battery drain. Most cloudlet-based...
Energy and time effectiveness is a primary consideration for smartphones or mobile devices. Cloud computing has the ability to conserve mobile device's energy by using the concept of computation offloading. Objective of Computation Offloading Decision Making Framework (CODMF) is to reduce energy consumption and response time for a mobile device simultaneously. Execution of computation intensive or...
Hadoop is commonly used framework for solving applications which deal with large volumes of data. Most of the current day applications require large storage and computation to be performed. Hadoop jobs are executed in cloud as cloud environment provides flexible provision, maintenance and scalability of resources. Hadoop framework can be improved in terms of parameter automation and map reduce tasks...
A blockchain is a distributed and decentralized ledger that contains connected blocks of transactions. Unlike other ledger approaches, blockchain guarantees tamper proof storage of approved transactions. Due to its distributed and decentralized organization, blockchain is beeing used within IoT e.g. to manage device configuration, store sensor data and enable micro-payments. This paper presents the...
The number of e-commerce customers and database services in cloud computing platforms has grown increasingly, leading providers to adopt resource-sharing solutions to meet growing demand for infrastructure resources, such as processing and storage. Consolidating database applications has become arguably a de-facto solution to support a large number of customers/tenants at low infrastructure costs...
Modern Cloud computing environments are rapidly evolving, leading to a growing adoption of dynamic pricing for virtual resources and of speedier deployment tools and to the emergence of hybrid Cloud scenarios. These trends suggest the opportunity to investigate a new generation of Cloud-based IT services, capable of adapting to changes in their operating conditions and deployment environment by dynamically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.