The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud technologies are still characterized by critical issues, which pose specific challenges for application developers and operators. In particular cloud application-level and infrastructure-level are completely decoupled both in the development and runtime phases leading in poor QoS cloud services. Main issues related to the optimize the use of the hardware resources are partially solve with virtualization...
Intrusion detection systems can be deployed for detecting distributed denied-of-service attack. However, because of the scale of the attack and/or size of the managed network, distributed intrusion detection system is more suitable than a centralized one. Nevertheless, because of distributed nature of such system, network traffic overhead and scalability become problem. This paper proposes a tree-based...
With the need of data storage increases tremendously nowadays, distributed file system becomes the most important data storage system in cloud computing. In distributed file system development, there are many researchers work hard to refine the architecture to provide scalability and reliability. In our work, we propose a distributed metaserver system including metaserver scale-out, metadata replication,...
Cloud computing aims to provide enormous resources and services, parallel processing and reliable access for users on the networks. The flexible resources of clouds could be used by malicious actors to attack other infrastructures. Cloud can be used as a platform to perform these attacks, a virtual machine(VM) in the Cloud can play the role of a malicious VM belonging to a Botnet and sends a heavy...
Cloud computing is the promising technology that provides computational, storage, network and database resources by employing the virtualization technology in the infrastructure layer. Nowadays, most of the applications are hosted in the multi-tenant based virtualized cloud environment. Scalability is the challenging task in this environment for effective utilization of the resources and to improve...
The data growth enhances the need of a method and paradigms responsible to deal with high scalability, reliability and fault tolerance in large amounts of data. Big Data is a framework capable of dealing with this need. This research makes usage of Apache Hadoop, and a Virtual Private Server (VPS) to analyze the performance through benchmark tests executed on locally, geographically distributed, and...
The selection of a particular NoSQL database for use in a big data system imposes a specific distributed software architecture and data model, making the technology selection difficult to defer and expensive to change. This paper reports on the selection of a NoSQL database for use in an Electronic Healthcare Record system being developed by a large healthcare provider. We performed application-specific...
The continuous information growth in current organizations has created a need for adaptation and innovation in the field of data storage. Alternative technologies such as NoSQL have been heralded as the solution to the ever-growing data requirements of the corporate world, but these claims have not been backed by many real world studies. Current benchmarks evaluate database performance by executing...
The replication mechanism of NoSQL database MongoDB includes Master/Slave structure and Replica Set. Write operation implement on Master, Slaves will send the synchronize data command asynchronously to Master to update its data. Read operation just implement on Master to provide the strong consistency, while read operation implement on Slave to provide the eventual consistency. Replica set is a group...
MongoDB is one of the typical NoSQL database. The database mechanisms of MongoDB about document-oriented storage, GridFS for storing files of any size. The data storage structure of MongoDB is given, which uses BSON as the data storage and network transfer format for documents, simple and fast in query and easy in horizontal scalability with low cost.
Despite the increasing number of mobile heterogeneous network elements (NEs) interconnected through the Internet, all of them setting the foundations for an agile IoT development, many issues remain still unsolved. The scalability of the current host-oriented Internet model is one of these problems. In this paper, we present a novel service-oriented architecture dealing with the scalability problem...
A key feature of Cloud computing is its agility and flexibility to support the scalability needs of business solutions. Currently, the agility is only limited to the scalability of the compute, memory and storage. To improve an application's agility, we need to monitor & measure solution level metrics and associate the performance of the metrics to the business agility needs of the solution...
Publish/subscribe (pub/sub) systems are widely used in numerous Internet-Of-Things (IoT) applications such as environment monitoring, supply chain tracing, healthcare, and vehicle networks. In these applications, publishers (e.g. Smart devices, sensors) are continuously generating large volume of data with an extremely high throughput, whereas subscribers are only interested in a small portion of...
Software-Defined Infrastructure (SDI) presents an approach for integrated management of virtualized heterogeneous resources. Monitoring and measurement is an essential component for effective control and management. This paper presents an architecture of a system, named MonArch, based on SDI that provides integrated monitoring and measurement functionalities. Unlike existing cloud and network monitoring...
Network Virtualization (NV) and Software-Defined Networking (SDN) are both expected to increase the flexibility and programmability of today's communication networks. Combining both approaches may even be a further step towards increasing the efficiency of network resource utilization. Multiple solutions for virtualizing SDN networks have already been proposed, however, they are either implemented...
Software-Defined Networking (SDN) can simplify traffic management in large-scale datacenter networks (DCNs). On one hand, it provides a robust method to address the challenge of performance interference (bandwidth sharing unfairness) in DCNs. On the other, its pragmatic implementation based on OpenFlow introduces scalability challenges, as it (a) adds latency for new flows (the controller must process...
Power and performance are two potentially opposing objectives in the design of a supercomputer, where increases in performance often come at the cost of increased power consumption and vice versa. The task of simultaneously maximising both objectives is becoming an increasingly prominent challenge in the development of future exascale supercomputers. To gain some perspective on the scale of the challenge,...
HBase is a popular distributed Key/Value storage system based on the idea of BigTable. It is being used in many data-centers, such as Facebook and Twitter, for their portability and scalability. For the system, low-latency and large storage is expected when used in industry. However, it is time consuming when retrieving one column via another one. Many technologies were considered to solve the problem...
With the development of cloud computing and internet, e-Commerce, e-Business and corporate world revenue are increasing with high rate. These areas require scalable and consistent databases. NoSQL databases such as HBase has been proven to scalability and well performance on cloud computing platforms. However, the inevitable special data with few increment and frequent access leads to hotspot data...
A non-invasive, cloud-agnostic approach is demonstrated for extending existing cloud platforms to include checkpoint-restart capability. Most cloud platforms currently rely on each application to provide its own fault tolerance. A uniform mechanism within the cloud itself serves two purposes: (a) direct support for long-running jobs, which would otherwise require a custom fault-tolerant mechanism...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.