The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization (NFV) is an emergent paradigm that is currently transforming the way network services are provisioned and managed. The main idea of NFV is to decouple network functions from the hardware running them. This allows to reduce deployment costs and further improve the flexibility and the scalability of network services. Despite these benefits, a major challenge cloud providers...
Periodic broadcasting is the most efficient strategy to distribute popular video streams. In the past decade, many periodic broadcasting schemes were presented to reduce client's buffer usage and client's waiting time. After that, people focused on the problem of heterogeneous receiving. A recently proposed broadcasting scheme named Delay Receiving (DeRe) solves this problem by ensuring low waiting...
Among the several threats to cyber services Distributed denial-of-service (DDoS) attack is most prevailing nowadays. DDoS involves making an online service unavailable by flooding the bandwidth or resources of a targeted system. It is easier for an insider having legitimate access to the system to circumvent any security controls thus resulting in insider attack. To mitigate insider assisted DDoS...
The Internet of Things leads to the inter-connectivity of a wide range of devices. This heterogeneity of hardware and software poses significant challenges to security. Constrained IoT devices often do not have enough resources to carry the overhead of an intrusion protection system or complex security protocols. A typical initial step in network security is a network scan in order to find vulnerable...
With the development of cloud computing, hybrid cloud has attracted extensive attention. It is a flexible collaboration of private clouds and public clouds, which can meet the increasing demands of energy consumption while reduce overhead. However, the clouds in hybrid clouds have to share data with each other. Therefore, hybrid connection mechanism remains a big issue. VPN is a common solution used...
Aggregating multiple access interfaces of a client is a promising way to satisfy the high bandwidth demand by high-definition video streaming services. However, how to efficiently use such aggregated bandwidth to improve the reliability of timely fetching video contents needs to be further studied. In this paper, we propose a partial overlapping chunk based dual-path transmission scheme, which uses...
Today, storage area networks (SAN) are widely used in data center networks to connect servers to data storage devices. In such a network, ensuring zero packet loss is very important for a server's network file system (NFS) to quickly access data across the network. Otherwise, the time spent on detecting packet losses and then retransmitting the lost data will severely harm the data access throughput...
Multi-Path TCP (MPTCP) boosts network performance of applications by aggregating bandwidth over multiple paths using sub-flows of the same TCP connection. However, MPTCP suffers from three limitations: (1) it is an end-to-end protocol with no control over the network routes, and sub-flows might end up traversing the same links, (2) it has no dynamic control over choosing the optimal number of sub-flows...
Nowadays high performance computers (HPC) are used to solve increasingly complex problems and process larger amounts of data. The growing computational requirements of applications can be met by utilizing more compute nodes. However, the average I/O performance a compute node can utilize is reduced with increased number of nodes. The performance gap between computation and I/O has long been a primary...
Given the growing demands for network services based sometimes on reduced resources, efficient solutions are continuously developed in order to operate the network infrastructures in optimum conditions. From network management viewpoint, the main challenge is related to traffic management solutions using data flow limitations for some specific users while giving higher priorities to others. If for...
This paper addresses energy efficient VNF placement and chaining over NFV enabled infrastructures. VNF placement and chaining are formulated as a decision tree search to overcome this NP-Hard problem complexity. The proposed approach is an extension of the Monte Carlo Tree Search(MCTS) method to achieve energy savings using physical resourceconsolidation and sharing VNFs between multiple tenants....
In this paper, we address cloud VoIP scheduling strategies to provide appropriate levels of quality of service to users, and cost to VoIP service providers. This bi-objective focus is reasonable and representative for real installations and applications. We conduct comprehensive simulation on real data of twenty three on-line non-clairvoyant scheduling strategies with fixed threshold of utilization...
Virtualization of computing and communication infrastructureswere disseminated as possible solutions for networksevolution and deployment of new services on clouddata centers. Although promising, their effective applicationfaces obstacles, mainly caused by rigidity on the managementof communication resources. Currently, the Software-DefinedNetworks (SDN) paradigm has been popularizing customizationand...
Road Side Units (RSUs)-based data communication (V2I) is an increasingly popular technique in vehicular networks to alleviate the frequent vehicle-to-vehicle (V2V) communication problem. On-demand broadcasting is a scalable approach for supporting large clients with dynamic demands. However, the performance of the traditional on-demand broadcast can be improved significantly with the incorporation...
The delivery and display of 360-degree videos on Head-Mounted Displays (HMDs) presents many technical challenges. 360-degree videos are ultra high resolution spherical videos, which contain an omnidirectional view of the scene. However only a portion of this scene is displayed on the HMD. Moreover, HMD need to respond in 10 ms to head movements, which prevents the server to send only the displayed...
In the process of making radio programs, Radio stations need to get a IoT of audio material, which are usually stored on the FTP server. The traditional radio program production station will download each audio, and do not consider the server's and the local environment, using a single-threaded download, which results in poor user experience. This paper designs an efficient download mechanism, which...
We present Catena, an efficiently-verifiable Bitcoinwitnessing scheme. Catena enables any number of thin clients, such as mobile phones, to efficiently agree on a log of application-specific statements managed by an adversarial server. Catenaimplements a log as an OP_RETURN transaction chain andprevents forks in the log by leveraging Bitcoin's security againstdouble spends. Specifically, if a log...
As a result of increasing in diversity and complexity, real-time embedded systems have to deal with both periodic and aperiodic tasks. In such systems, it is expected that response time of aperiodic tasks is as short as possible. Total Bandwidth Server (TBS) is one of effective task scheduling algorithms for a mixture of periodic and aperiodic tasks. As a successor to TBS, Adaptive TBS (ATBS) is an...
Fog computing is a model in which data and processing are concentrated on devices at the edge of the network, rather than almost entirely in the cloud. This new paradigm tries to solve the latency and bandwidth issues that the current cloud systems have to deal with, and also addresses the scalability problems caused by the exponential growth of the number of smart devices due to the success of the...
With the development of streaming media technology, streaming media services are widely used. In the case of limited bandwidth resources in the streaming media system and the bandwidth fluctuation of user requests, how to ensure the quality of the streaming media service is an important problem. In this paper, a limited bandwidth resource scheduling algorithm for a streaming media server was proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.