The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Medical applications, along with Information and Communication Technology (ICT), have contributed with many solutions to support the treatment of SEPSIS. However, there are few solutions for the transport of sepsis data with Quality of Service (QoS). In this paper we propose a self-manageable architecture for the provision and delivery of sepsis data using Software-Defined Networking (SDN). To evaluate...
In order to integrate a large number of distributed energy resources in distribution grids a robust decentralized information and communication control structure is required. This paper proposes an overlay peer-to-peer (P2P) architecture for controlling and monitoring microgrids in real time, which has a great capacity of adaptation to the demanding network requirements of these environments. The...
Context-oriented computing has introduced new challenges in Quality of Service (QoS) management since the diversity of applications, forms of access and the TCP/IP architecture model make it difficult to provide services aware of Quality of Experience (QoE). In view of that, we propose an autonomous architecture of service provision and delivery that is QoE aware. The proposed components were designed...
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way....
Planetary bearings inside a helicopter main gearbox (MGB) are key components, successful diagnosis of planetary bearing defects benefits helicopter maintenance, reducing accidents rate and increasing aircraft flightworthiness. Most widely adopted methods for bearing fault diagnosis are envelope analysis and kurtogram; both have achieved many successes in practical application. However, diagnosis of...
Currently, researchers use simulators to experimenttheir innovation on emerging non-volatile memory. Unfortunately, simulation method is both time-consuming andare hard to debug. In this paper, we present a non-volatile memory emulatorwhich enables system-level research on emerging memory. Ouremulator uses performance monitoring units on off-the-shelfprocessors to implement an accurete performance...
It has become increasingly important for content providers (CPs) to reach consumers with low latency. Peering links that connect CPs directly to access Internet service providers (access ISPs) have been used for this purpose thus providing one-hop AS paths from CPs to users. While providing improved latency, these peering links still do not give CPs control over the entire end-to-end path to their...
Results concerning joint Spectrum Availability (SA) monitoring in the 5–10 MHz range of the High Frequency (HF) band (3–30 MHz), for a 24-hour period, in two locations situated in the central and western part of Romania are reported. Measurements have been realized simultaneously in the two locations, with similar USRP SDR-based equipment, for 24 hours on February 27, 2017. Results indicate that SO...
The lower layer characteristics of 60 GHz wireless networks impact the entire protocol stack. This includes effects such as sudden link failure due to blockage, high packet loss due to deafness, or suboptimal transmit rates due to antenna misalignment. To understand the resulting behaviors at the upper layers, it is key to have access to lower layer information. At the time of writing, 60 GHz experimentation...
Cyber-physical systems (CPSs) are emerging as a new technology, which is used to provide seamless interaction between the physical and cyber worlds. This novel paradigm is a natural evolution and extension of wireless sensor networks (WSNs) and control models to allow for effective monitoring and control of physical systems from the computing environment. In order to support this interface and allow...
Despite being industry standard, load balancing via virtual machine (VM) migration methods in modern cloud data centers still exhibit two major performance issues: resulting system load balancing degree and total time till balanced state. Over the years research has been conducted to improve these metrics. Yet due to the fact that these issues influence each other, it has been a challenge to achieve...
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage and control network traffic. However, SDN will experience long packet delay and high packet loss rate when the communication link between two planes is jammed by SDN-aimed DoS attacks with massive table-miss packets. In this paper, we propose FloodDefender, an...
Crowdsourced signal monitoring systems are gaining attention for capturing the wireless spectrum at large geographical scale. Yet, most of the current systems are still limited to simple power spectrum measurements reported by each sensor. Our objective is to enhance such systems with signal decoding capabilities performed in the backend while retaining the original vision of a low-cost and crowdsourced...
Network verification has been recently proposed to detect network misconfigurations. Existing work focuses on the reachability. This paper proposes a framework that verifies the Service Level Agreement (SLA) compliance of the network using static verification. This work proposes a quantitative model and a set of algorithms for verifying performance properties of a network with switches and middleboxes,...
In this paper, we explored what could be achieved by a potential attacker on the I2P Network in terms of application and user profiling. In both cases, the effect of bandwidth sharing and participation have been analyzed. To explore this, we used a machine learning based approach to analyze the flows extracted from the traffic generated by the applications and the users. Our results show that profiling...
The combination of fast online anomaly detection and offline learning is a vital element of operations in large-scale datacenters and utility clouds. Given ever-increasing datacenter sizes coupled with the complexities of systems software, applications, and workload patterns, such anomaly detection must operate continuous and real-time at runtime. Further, detection should function for both hardware...
The quality of service for an end user is defined by the quality of the network links connecting user and service provider. There are several parameters impacting network communication links, a very important one being the available end-to-end bandwidth. Bandwidth measurements in cellular wireless networks with traffic reactive nature, nomadic end users and highly dynamic shared resources is a challenging...
Forwarding fault detection increases the robustness of network connectivity by finding and allowing to react to faulty routers. One of the essential steps in forwarding fault detection is summarizing the observed traffic at different vantage points, so that the behavior of each monitored router can be assessed using a traffic validation function. This paper studies and characterizes 3 sketches (AGMS,...
In this paper, we present an architecture and implementation for self-managing cloud application using overlay networks and software defined networking (SDN). Through real world experiments on Amazon EC2 and Smart Applications on Virtual Infrastructure (SAVI) cloud, we demonstrate how our management mechanism autonomously maintains SLAs of application scenarios without provisioning extra resources.
This work proposes a framework for proactive resource allocation in IaaS clouds to improve the system performance. In this system framework, the over-commit approach is applied to improve resource utilization and to show the performance impact. Although the over-commit approach could obtain better resource utilization, there are still some risks. When the amount of aggregated resources requested by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.