The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Desktop Infrastructure refers to a process of running user's desktop in a virtual machine that lives on a server in the datacenter. A protocol is important in the communication process of virtual desktop infrastructure. For small deployment scenario, we have two options: using built-in RDP protocol that comes from Windows desktop; or adding more investment for PCoIP protocol in VMware environment...
Video is becoming one of the biggest traffic generating elements and the current progressive download approach has been found inefficient in terms of resource utilization. A machine learning based approach is proposed for the video streaming with DASH (Dynamic adaptive streaming over HTTP) as an underlying architecture to help client adapt to the changing streaming environment. The reason for using...
Modern internet traffic is heavily composed of some form of video communication. In addition, video streaming is slowly replacing regular phone connections. Given that most video transport utilizes Video over Hypertext Transfer Protocol/Transmission Control Protocol (HTTP/TCP), it is important to understand TCP performance in transporting video streams. Recently, multipath transport protocols have...
Low latency anonymity systems, like Tor and I2P, support private online communications, but offer limited protection against powerful adversaries with widespread eavesdropping capabilities. It is known that general-purpose communications, such as web and file transfer, are difficult to protect in that setting. However, online instant messaging only requires a low bandwidth and we show it to be amenable...
Most of the recent set-top boxes for digital video broadcasting connect to the Internet. They can receive data from broadcasting systems and from the Internet. Such hybrid broadcasting environments, in which clients can receive data from both broadcasting systems and communications systems, are suitable for streaming delivery since they complement their demerits for streaming delivery with each other...
The number of Internet users in Indonesia in 2020 will increase up to 136.2 million users, while the Internet traffic will increase up to 2.1 Exabyte per month. However, 88% of internet traffic goes to international link and only 12% of traffic goes to domestic server. The problem is that the current capacity of Indonesian international links is only 20 Gbps, while the the required capacity is predicted...
This work focuses on how to provide the best virtual desktop technology, virtualization performance and hardware in the computer classroom. There are using the three popular virtualization technologies in the same environment to establish the same conditions, pure performance comparison: VMware Horizon, Citrix XenDesktop, and Microsoft VDI. Test software used to the current popular software, system...
The use of Deep Packet Inspection (DPI) equipment in a network could simplify the conventional work load for system management and accelerate the control action. The authors proposed a congestion control method that uses a DPI device installed in a network to estimate overload conditions of servers or network links and, upon detecting an overload condition, resolves congestion by moving some virtual...
Obliviousness is crypto primitives which intent to hide access pattern. Although ORAM is strongest crypto model, it incurs significant overhead. Elaine Shi et. al. propose Obliviousness Data Structrue (ODS) that makes a great theriotical improvement comparing to general ORAM algorithm, in case of the data blocks exhibit some degree of access predictability. Take AVL tree as an example, when all data...
Ubiquitous in-network caching is one of the important aspects of the Information-Centric Networking (ICN), which has been a hot topic of ICN research. Many works have tried to propose better caching schemes to solve the drawbacks of the default en-route scheme, but most of them are insufficient to improve performance of entire network for just considering single layer optimization factor. Also considering...
In this paper, we propose an OpenFlow-assisted framework for P2P (peer-to-peer) live streaming, which incorporates an OpenFlow-assisted architecture and an OpenFlow-assisted algorithm. The architecture combines the characteristics and advantages of both BitTorrent system and OpenFlow network. The algorithm can dynamically calculate the path and corresponding available bandwidth for each flow according...
Elastic optical networks (EONs) are considered as the most promising technology for interconnecting data centers. With the rapid growth of inter- datacenter traffic, power consumption of EONs becomes a significant challenge. In this work, we present a lightpath management algorithm that uses traffic prediction techniques to eliminate unnecessary lightpath termination and re- establishment so as to...
Geographical load balancing (GLB) is widely established by cloud providers, to exploit the differences in electricity price, local green energy generation, transmission delay and cost etc across geographically dispersed data centers (DCs). With GLB, a cloud provider can achieve reduction of electricity cost or/and bandwidth cost or/and delay cost. However, these objectives are not independent from...
Video streaming now amounts to the majority of traffic in the Internet. Media streaming relies on large-scale content distribution networks (CDNs), that incur significant costs to build or use. P2P distribution of video content reduce reliance on CDNs and costs. Unfortunately, P2P distribution is fraught with QoE problems, specially during flash crowds or in scenarios where users have limited bandwidth...
Triggered by several head-mounted display (HMD) devices that have come to the market recently, such as Oculus Rift, HTC Vive, and Samsung Gear VR, significant interest has developed in virtual reality (VR) systems, experiences and applications. However, the current HMD devices are still very heavy and large, negatively affecting user experience. Moreover, current VR approaches perform rendering locally...
Due to its high bandwidth, good maintainability and flexibility, Gigabit Ethernet is confoundedly suitable for high-performance server applications. As an interface between network and host, Ethernet controller has been continually evolving to meet the ever increasing communication demands being placed on it by enterprise applications. For the Ethernet, network links and physical devices, such as...
This paper presents a performance study of the message queue protocols that are used for binary encoded JSON data transmission in a distributed network, which is the foundation of the CNC system. The distributed architecture of the control system makes it possible to simplify the integration of automated and robotic equipment into the cyber-physical production system (CPPS) by creating an open program...
Cloud Services have become an important part of the business world. Although public cloud services provide a range of advantages, it also creates concerns over security, network usage and the need for technical expertise in the management of the cloud. This paper describes a local private cloud which uses on-site hardware infrastructure and which incorporates a three tier management system. This device...
We found that directly employing MPTCP in WiFi network might adversely affect the overall network performance. The connecting MPTCP client achieves little bandwidth advantage through redundant paths of weak signal strength. However, it impairs the overall network performance by unintentionally reducing the throughput available to other clients sharing that access point in much greater extent. In this...
Smart-home is becoming increasingly popular in recent years, and it introduces a new content retrieval paradigm - delay-insensitive downloading. In this new paradigm, users do not require the content retrieval task to finish as soon as possible, but only set a deadline for it. We study the role of this paradigm in the traffic engineering of a chunk-based cloud storage service. We propose that it could...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.