The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multicast can not only shorten task completion time of applications, but also effectively reduce overall bandwidth consumption in data center networks (DCNs). However, load imbalance and sudden link blocking will seriously impact the network performance owing to the fundamental characteristics of huge traffic in DCNs. To address this problem, in this paper, we propose a novel multicast scheduling...
Syslogs on switches are a rich source of information for both post-mortem diagnosis and proactive prediction of switch failures in a datacenter network. However, such information can be effectively extracted only through proper processing of syslogs, e.g., using suitable machine learning techniques. A common approach to syslog processing is to extract (i.e., build) templates from historical syslog...
The report addresses a remote molecular diagnostics system for studies of the edge plasma inT-10 tokamak at National Research Centre Kurchatov Institute. Web control of a monochromator and a CCD camera based on Internet technologies was used to monitor radiation. The structure and communications chart of the software components implemented in the system are described. A special web application has...
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
The paper is devoted to analyzing unsafe features of an Extended Finite State Machine such as the exceeding of the value of a context variable and/or an output parameter, the reachability of critical states, etc. As the ordinary simulation of an EFSM is very complex, the well known verifier Java Path Finder is used for this purpose. The EFSM is implemented as a template Java code that is checked for...
Middleboxes are widely deployed to perform various network functions to ensure security and improve performance. The recent trend of Network Function Virtualization (NFV) makes it easy for operators to deploy software implementations of these network functions on commodity servers. However, virtual network functions consume different amounts of resources when processing packets. Thus a multi-resource...
Stateful programmable dataplanes are emerging as a disruptive technology and an enabler factor for network function virtualization in SDN environments. In this demo paper we show three real world use cases with stateful forwarding requirements to validate both the hardware and software implementations of the Open Packet Processor data plane.
Network Function Virtualization (NFV) brings agility and flexibility delivering network services with cost efficiency to network operators. As an emerging technology, it also presents several challenges, among them, ensuring high performance for virtualized network functions, based on software implementation and running on standard IT servers, instead of custom hardware appliances. In this article,...
Using genetic data to infer relatedness has been crucial for genetics studies for decades. In a previously published paper together with the KING software, we demonstrated that the kinship coefficient, a measure of relatedness between a pair of individuals, can be accurately estimated using their genome-wide SNP data, without estimating the allele frequencies at each SNP in the whole dataset. The...
Deep learning is a sub-set of machine learning practice employing models based on various learning network architectures and algorithms in the field of artificial intelligence. Businesses planning to adopt a deep learning solution should comprehend a set of complex choices in hardware, software, configuration and optimizations to setup a functional deep learning solution. This paper will describe...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
Long-tail latency of web-facing applications continues to be a serious problem. Most of the previously published research addresses two classes of long latency problems: uneven workloads such as web search, and resource saturation in single nodes. We describe an experimental study of a third class of long tail latency problemsthat are specific to distributed systems: Cross-Tier Queue Overflow (CTQO)...
This paper proposes a new software platform to control and monitor a squad of unmanned vehicles. Through the use of an open-source flight controller and an on-board Raspberry Pi it is possible to create a system that enables communication between a remote ground control stations (GCS) and a unmanned aerial vehicles (UAVs). Both are connected through the use of wireless and cellular networks like Wi-Fi,...
Software evolution is a well-established research topic, but not in the web applications area. Web projects are normally more complex than other software development projects because they have both server and client code, encompass a variety of programming languages, and are multidisciplinary. We aim to produce a catalog of web smells to help mitigating quality problems in web apps implementation,...
This paper proposes a new software platform to control and monitor a squad of unmanned vehicles. Through the use of an open-source flight controller and an on-board Raspberry Pi it is possible to create a system that enables communication between a remote ground control stations (GCS) and a unmanned aerial vehicles (UAVs). Both are connected through the use of wireless and cellular networks like Wi-Fi,...
Today's Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot...
Traditional DDoS anti-spoofing scrubbers require dedicated middleboxes thus adding CAPEX, latency and complexity in the network. This paper starts by showing that the current SDN match-and-action model is rich enough to implement a collection of anti-spoofing methods. Secondly we develop and utilize advance methods for dynamic resource sharing to distribute the required mitigation resources over a...
The present need for software organizations to seamlessly carryout software development results to significant high cost of electricity usage and emission of CO2 which contributes to climate changes. Therefore there is need for software practitioners to adopt sustainable practices in software development process. Sustainable practices can be adopted when software practitioners utilizes software which...
With software-defined network (SDN) and network function virtualization (NFV) techniques, we can embed the service chain consisting of a sequence of virtualized network functions (VNFs), i.e., we can determine the flow path and deploy the VNFs contained in the service chain at any place on the path. In the literature, the methods of service chain embedding bound the number of VNFs at a node, whereas...
As an important part of college teacher team and student management team, college counselors play more and more important role in modern higher education system. We utilize the B/S mode is to develop management information system for counselor, and the proposed system is made up of manager module, counselor module, student module, teacher module and class module. In the ER diagram of the proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.