The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
AWS Lambda (Amazon Web Services) is the most popular serverless architecture provided by Amazon. It currently supports three platforms: JavaScript, Python, and Java Virtual Machine (JVM). The JVM could be the most complicate platform among the three as there are many languages that target the JVM platform besides Java. In addition, the complex hierarchy of dependencies, versioning, and the class loader...
The widespread deployment of smart phone and smart object technologies have fostered the rise of People-centric Internet of Things. People-centric Internet of Things is the direct motivation and drive for agile and social manufacturing applications in future Industry 4.0. However, it is challenging for human to organize services around with crowdsourced, open, decentralized smart objects. In this...
It is well acknowledged that one of the key enabling factors for the realization of future 5G networks will be the small cell (SC) technology. Furthermore, recent advances in the fields of network functions virtualization (NFV) and software-defined networking (SDN) open up the possibility of deploying advanced services at the network edge. In the context of mobile/cellular networks this is referred...
Infrastructure-as-a-Service environments are becoming increasingly popular. When there is a failure, many applications require service restoration within a few seconds. Reaction to failures in Cloud is still slow for many applications. Monitoring is limited to instance metrics that are not conducive to precise diagnosis due to complexity of virtualization in physical hosts. Interferences among different...
In this paper, we propose OWCells, a class of optical wireless cellular data center network architectures in which fixed line of sight (LOS) optical wireless communication (OWC) links are used to connect racks of servers arranged in regular polygonal topologies. We present the OWCell DCN architecture, develop its theoretical underpinnings, and investigate routing protocol and OWC transceiver design...
With Emergence of broadband access networks and powerful personal computer systems the demand for network-delivered full-motion streaming video is growing. People upload their home made videos. Different companies have started to offer software as service. Data traffic is increasing each day at an unprecedented rate creating congestion on the backbone part of the network. Backbone network congestion...
Among the several threats to cyber services Distributed denial-of-service (DDoS) attack is most prevailing nowadays. DDoS involves making an online service unavailable by flooding the bandwidth or resources of a targeted system. It is easier for an insider having legitimate access to the system to circumvent any security controls thus resulting in insider attack. To mitigate insider assisted DDoS...
The mobile and wireless networks used extensively by Internet of Things devices, are becoming more popular for data transfer between Cyber-Physical Systems. These are accessed through mobile applications installed on mobile devices, with various operating systems. The paper is presenting a Cyber Physical Systems Oriented platform for mobile transactions, with applications in remote services access...
The Domain Name Service (DNS) is a vital service in the Internet. Much more than a simple translation mechanism, it also allows higher profile functionalities such as load balancing and enhanced content distribution. In the scope of cloud computing, DNS is foreseen as an elastic and robust service, supporting failover mechanisms, decentralised configuration and multi-tenant isolation.
“Network slicing” means creating logically isolated virtual networks (slices) running different network functions for different services. However, this technology imposes a loss of multiplexing gain available in monolithic networks as resources allocated to each slice become exclusive and isolated. This situation leads to resource wastage. In this paper, we propose a concept called “per-group slicing”...
Multi-Path TCP (MPTCP) boosts network performance of applications by aggregating bandwidth over multiple paths using sub-flows of the same TCP connection. However, MPTCP suffers from three limitations: (1) it is an end-to-end protocol with no control over the network routes, and sub-flows might end up traversing the same links, (2) it has no dynamic control over choosing the optimal number of sub-flows...
With systems performing Simultaneous Localization And Mapping (SLAM) from a single robot reaching considerable maturity, the possibility of employing a team of robots to collaboratively perform a task has been attracting increasing interest. Promising great impact in a plethora of tasks ranging from industrial inspection to digitization of archaeological structures, collaborative scene perception...
Bluefix is a solution we created for managing the vulnerabilities in a cloud native world where clients operate their own DevOp pipelines and design the same management function and assurance of that of traditional managed services. We show that the challenges imposed by container cloud and DevOp culture requires significant departure of service management design. As a case study, we examined how...
The Secure Sockets Layer (SSL) is the main protocol used to secure Internet traffic and cloud computing. It relies on the computation-intensive RSA cryptography, which primarily limits the throughput of the handshake process. In this paper, we design and implement an OpenSSL library, termed PhiOpenSSL, which targets the Intel Xeon Phi (KNC) coprocessor, and utilizes Intel Phi's SIMD and multi-threading...
A distributed virtual environment (DVE) consists of multiple network nodes (servers), each of which can host many users that consume CPU resources on that node and communicate with users on other nodes. Users can be dynamically migrated between the nodes, and the ultimate goal for the migration policy is to minimize the average system response time perceived by the users. In order to achieve this,...
Web pages at present have become dynamic and frequently changing, compared to the past where web pages contained static content which did not change often. People have the need to keep track of web pages which are of interest to them, using bookmarks in the web browser and continuously keep track of them in order to get the updates. Tracking changes which occur in these bookmarked web pages and getting...
With the rapid development of HPC, more and more attention is paid to the security of HPC. In this paper, a new hierarchical barrel model based on the traditional barrel model is proposed, which is used in two aspects: Firstly, the HPC overall security architecture is a hierarchical barrel, divided by value size and difficulty of offensive and defensive, supplemented with safety measures; Secondly,...
The steadily increasing success of Cloud Computing is causing a huge rise in its electrical power consumption, contributing to higher energy costs, as well as to the greenhouse effect and the global warming. One of the most common key strategies to reduce the power consumption of data centers is the consolidation of virtual machines, whose effectiveness strongly depends on a reliable forecasting of...
MOBA (Multiplayer Online Battle Arena) games are currently one of the most popular online video game genres. This paper discusses implementation of a typical MOBA game prototype for Windows platform in a popular game engine Unity 5. The focus is put on using the built-in Unity components in a MOBA setting, developing additional behaviours using Unity's Scripting API for C# and integrating third party...
Most people refer to modern mobile and wireless ubiquitous solutions as an IoT application. The advances of the technology and establishment of cloud-based systems emerge the idea of the connected world over Internet based on distributed processing sites. In this paper, we discuss the dew computing architectural approach for IoT solutions and give an organizational overview of the dew server and its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.