The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation...
This work focuses on how to provide the best virtual desktop technology, virtualization performance and hardware in the computer classroom. There are using the three popular virtualization technologies in the same environment to establish the same conditions, pure performance comparison: VMware Horizon, Citrix XenDesktop, and Microsoft VDI. Test software used to the current popular software, system...
The use of Graphics Processing Units (GPUs) has become a very popular way to accelerate the execution of many applications. However, GPUs are not exempt from side effects. For instance, GPUs are expensive devices which additionally consume a non-negligible amount of energy even when they are not performing any computation. Furthermore, most applications present low GPU utilization. To address these...
The Indian ‘smart cities’ have burgeoning population consuming the intelligent systems running over the city infrastructure and services. One critical set of such services is that of the emergency services involving Ambulances, Police and Firefighters. The services provided by these officials are often time critical, which makes their easy and quick availability a must have attribute. This paper proposes...
In the continual battle between malware attacks and antivirus technologies, both sides strive to deploy their techniques at always lower layers in the software system stack. The goal is to monitor and control the software executing in the levels above their own deployment, to detect attacks or to defeat defenses. Recent antivirus solutions have gone even below the software, by enlisting hardware support...
Recent deployments of FPGAs as compute resources in data centers have raised security concerns. One concern is how to prevent user-deployed logic in the FPGA from accessing privileged data such as physical addresses or raw network traffic. Addressing this issue uses the concept of ‘privileged’ mode FPGA logic that is kept separate from ‘user’ mode logic. Logical separation can be achieved with design...
PCIe bus is widely applied because of its high-bandwidth, high reliability and low cost characteristic. Research on PCIe root complex architecture based on FPGA begin to receive attentions. However, current methods are usually expensive, code closure and poor flexibility. A new open source PCIe root system architecture based on Xilinx SOPC platform is proposed in this paper. The system is mainly composed...
The architectures of large-scale Internet servers are becoming more complex each year in order to store and process a large amount of Internet data (Big Data) as efficiently as possible. One of the consequences of this continually growing complexity is that individual servers consume a significant amount of data even when they are idle. In this paper we experimentally investigate the scope and usefulness...
Due to its high bandwidth, good maintainability and flexibility, Gigabit Ethernet is confoundedly suitable for high-performance server applications. As an interface between network and host, Ethernet controller has been continually evolving to meet the ever increasing communication demands being placed on it by enterprise applications. For the Ethernet, network links and physical devices, such as...
The Internet of Things means a connected world. When reaching the industrial level, the automation equipment present a large life cycle and the systems are many times conceived using proprietary protocols. Bringing interoperability to local automation is often a difficult task and changes in the functional structures, particularly in the case of critical infrastructures like the water industry, have...
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Particulate matter pollution becomes an increasingly important problem in developing countries and poses a hazard to human health especially in indoor environment. At the same time, modern buildings are equipped with advanced sensing and control technologies, offering control and optimization capabilities over a large range of parameters. This paper proposes an open platform of a WiFi-enabled indoor...
Big data term refers to different variations of large datasets to complex to be processed by traditional computing methods. The paper presents a system for retrieving images in relational databases in a distributed environment. Content of the query image and images in the database is compared using global color information and local image keypoints. Image keypoints are indexed by fuzzy sets directly...
Network Functions (NFs) are deployed in networks for a variety of purposes, e.g. monitoring, security, or performance optimization. During packet processing, NF maintains the states of processed packets and/or manipulates packets based on these states. Some of these states are per-flow states while others are multi-flow states. With the emerging of network function virtualization (NFV), it is common...
In this paper, we investigate the service capacity of a software-defined network with network function virtualization and service chaining. To obtain and achieve the service capacity, we formulate a mixed integer linear programming problem to jointly optimize the placement of virtual machines and the steering of network flows. In addition, we propose the greedy linear programming relaxation algorithm...
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
Providing the optimal configuration for a software router poses a lot of technical challenges that do not present in the dedicated hardware router. One of them is how to characterize performance varying due to different configurations on commodity hardware. This paper addresses the problem of configuring a software router that provides the minimum of average packet latency. Since changing all combinations...
Network Function Virtualization promises to reduce the overall operational and capital expenses experienced by the network operators. Running multiple network functions on top of a standard x86 server instead of dedicated appliances can increase the utilization of the underlying hardware and reduce the maintenance and management costs. However, total cost of ownership calculations are typically a...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.