The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Parallel computer architectures bring synchronization problem which bog down the system. And the speed gap between CPU and memory keeps growing, making data operation more expensive. In some data-intensive applications, there are similar or coincident child operations in parallel threads, which take unnecessary resources. To effectively exploit parallelization, reduce the price of data operation,...
Within the policies of an organization could find the not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others. However as has not been implemented...
A smart home control system could link independent electric appliances together 'intelligently' and provide comprehensive, fast and smooth exchange of information. This system gives people real-time information control, which improves their life quality. In this study, an embedded smart home system based on socket network connections was designed using ARM9 development board and embedded Linux operating...
Mobile devices nowadays has become more popular than ever, but mobile applications still suffer from limitations of available resources imposed by the platforms. Offloading mobile application to a virtual machine deployed on cloud server is one feasible solution. However, this method appears to be effective only for the cases of running stand-alone applications and is not able to achieve cooperative...
As VoIP (Voice-over-IP) Services are becoming more popular, various types of attacks against them are increasing. The main protocol that is used in VoIP is SIP. SIP is subject to various types of attacks including Denial-of-Service (DoS) attack. This paper reports our experiment of simulating VoIP system using existing open source tools and technology. The simulated VoIP system is used to demonstrate...
The study for the establishment of a complete flight information system that Provide airport management authorities as passengers aboard the aircraft before departure and after the arrival of the various kinds of information, In order to after the arrival of the aircraft to help passengers get instant information, Flight management system has been capture by the Aeronautical Information Services system...
In today's data centers, storage hardware is getting virtualized and shared across multiple tenants. The storage virtualization is expected to significantly increase resource utilization, and consequently provide infrastructure providers with tremendous cost savings. In a shared environment, however, demanding tenants can severely impact the IO performance of co-located tenants. Therefore, in order...
Live virtual machine migration is an essential tool for dynamic resource management in current data centers. Many techniques have been developed to achieve this goalwith minimum service interruption. In this paper, we proposea pre-copy live VM migration using Distributed SharedMemory (DSM) computing model. The setup is built usingtwo identical computation nodes to construct the environmentservices...
Computing over the Web can be applied to solve problems of many types of users, namely companies, which can thus benefit from remote services, e.g., from academia, without the user's awareness. An illustration of scientific computing over the Web is described, based on remote servers in parallel, as fits separable time consuming tasks. The illustrative problem chosen was the probabilistic behaviour...
The paper focuses to the analysis of attacks against the honeynet from various autonomous systems (AS) in the Internet. The probes are distributed across various network types - academic, commercial VPS, ISP - in Czech Rep. and Slovakia. Attacker behavior differences per AS as well as activities done in the honeynet on individual probes were analyzed. Advanced statistical methods were applied to extract...
A “smart City” includes many technological components (e.g., smarter intelligent transporting system, energy sharing, and safety and security service) that use the Internet communication technology, The Internet of Things (IoT) has an especially important role. The energy management system (EMS) is one of the main components in a smart city and is intended to conserve energy by using IoT technology...
Many types of servers exists which includes both publicly accessible servers and internal servers such as mail servers, web servers, application servers, build and test servers etc., that store many confidential and sensitive information. Providing security to such servers has become one of the core requirements in today's world as they are under risk of attack. The data stored on the server can range...
Process schedulers are part of the core functionality of an operating system (OS), and have been enhanced over the years to account for multiple cores in the processors and to support multi-threaded applications. In this study, we investigate the impact of the Linux scheduler's load-balancing algorithm on the performance of multi-threaded OpenSIPS (an open source SIP proxy server, SPS) running on...
The rapid adoption of networks that are based on “cloudification” and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of singlepurpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities...
One of the main goals of multipath TCP (MPTCP) is to achieve higher throughput than regular TCP by utilizing multiple paths simultaneously. When these paths share a common bottleneck, MPTCP tries not to be more aggressive than a regular TCP flow. This is achieved by MPTCP's coupled congestion control mechanism that couples the increase factor of MPTCP's subflows in congestion avoidance. However, slow-start...
Several studies have been conducted where authors compared the performance of open source Intrusion detection systems, namely Snort and Suricata. However, most studies were limited to either security indicators or performance measurements under the same operating system. The objective of this study is to give a comprehensive analysis of both products in terms of several security related and performance...
As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information leakage attacks or privilege escalation attacks program memory. Compared to control-flow hijacking attacks, such non-control data exploits have limited expressiveness, however, the question is: what is...
With the widespread availability of multi-homed devices, multipath transport protocols such as MPTCP are becoming increasingly relevant to support better use of multiple connectivity through capacity aggregation and seamless failover. However, capacity aggregation over heterogeneous paths, such as offered by cellular and Wi-Fi networks, is problematic. It causes packet reordering leading to head-of-line...
Network operators seek more flexibility to provide added-value services to their customers. We propose to leverage the IPv6 Segment Routing architecture with a example usecase. We also provide an implementation of SR-IPv6 and we evaluate its performance on broadband routers.
Linux Server Operating system is widely used in electric power SCADA systems in China. In order to study the performance difference between different distribution Linux Server operating systems so that we can select an appropriate distribution to use, the paper compares four secure Linux server operating system's performance using lmbench benchmarking methodology. The experiments showed that lmbench...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.