The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A video streaming system with over-the-top delivery has to select the servers that handle the service requests such that the content is delivered with the desired quality and system resources are efficiently used. Server selection can be formulated as a multi-criteria optimization problem, but solving this problem requires dynamic information about system resources. In this paper, we study the performance...
In this paper, we introduce Mayflower, a new distributed filesystem that is co-designed from the ground up to work together with a network control plane. In addition to the standard distributed filesystem components, Mayflower has a flow monitor and manager running alongside a software-defined networking controller. This tight coupling with the network controller enables Mayflower to make intelligent...
Named-Data Networking architecture relies on cache networks, where nodes store the data for further requests. However, the memory needed at each node called Content Store represents the most significant part of the entire cost of the infrastructure that has to be supported by network providers, making difficult the change from the current Internet infrastructure to a Future Internet based on NDN....
In this paper, the performance of HTTP protocol and FTP Protocol is analyzed by using OPNET-based simulation. Firstly, related scenarios are modeled with OPNET Simulator. Furthermore, two case studies are conducted by choosing average queuing delay and TCP delay as performance indices respectively. In the case of HTTP protocol's performance, the changing trend with the increase of the number of clients...
This paper presents the experimental evaluation of an SDN-based orchestration system enabling the automated and coordinated arrangement of both computing and network resources in cloud Data Centers. The testbed has been set-up in the Fed4FIRE virtual experimental environment that allows for extensive, large-scale and cross-functional tests to be carried out. Results show that the selection of servers...
Software-Defined Networking (SDN) is bringing DevOps [1] capabilities to current networks, reducing the time-to-market for new services and thereby providing a strong incentive for adoption to Service Providers and Network Operators. However, the current SDN landscape is extremely fragmented, so that different open and closed source controller frameworks such as OpenDaylight [2], Ryu [3], Floodlight...
Information-Centric Networking (ICN) or Content-Centric Networking (CCN), as it also known for, has recently been proposed as an evolutionary framework to propel the current Internet network architecture towards a content oriented design. Mobility-aware caching can be deemed as indispensable for improving the experience of mobile users. To this end, we propose a proactive caching with redirection...
The rapid increase of portable devices providing a multitude of mobile applications have led to excessive cellular traffic demands and consequently to the overload of cellular networks. Recently, migrating this traffic by opportunistic vehicular networks has attracted a great interest and appeared as a promising solution. Indeed, only a limited set of vehicles (seeds) is selected to download objects...
The domains of parallel and distributed computing have been converging continuously up to the degree that state-of-the-art server computer systems incorporate characteristics from both domains: They comprise a hierarchy of enclosures, where each enclosure houses multiple processor sockets and each socket again contains multiple memory controllers. A global address space and cache coherency are facilitated...
Data center networks are high-bandwidth, low-latency networks with clear-defined topology and busy internal data exchange traffic. TCP is widely used in data centers to transport data, however its default behavior during the flow initialization phase may be unsuitable for data center networks and affect the responsiveness of data transmission, especially when the flow is short. Considering that data...
In distributed SDN architectures, the network is controlled by a cluster of multiple controllers. This distributed approach permits to meet the scalability and reliability requirements of large operational networks. Despite that, a logical centralized view of the network state should be guaranteed, enabling the simple development of network applications. Achieving a consistent network state requires...
This paper presents PTNet, a new data center topology that is specifically designed to offer a high and parameterized scalability with just one layer architecture. Furthermore, despite its high scalability, PTNet grants a reduced latency and a high performance in terms of capacity and fault tolerance. Consequently, compared to widely known data center networks, our new topology shows better capacity,...
Todays data centers may contain tens of thousands of computers with progressively more specialized and expensive equipments. Thus, the research community has proposed various interconnect topologies e.g FatTree, Dcell and Bcube. However, these architectures are too complex and very expensive to construct and they suffer from high average path length (APL) and latency. Motivated by these challenges,...
Over the years, caching has been leveraged (and established) as an add-on functionality to enhance network performance. However, Information Centric Networking (ICN) conceives caching at network layer (i.e. beyond the premise of end-to-end principle) thereby making it one of the core functionalities. Further, ICN advocates named-content (another core functionality) that allows content-consciousness...
While there are many motivations to virtualize networks, easing their management is probably one of the most important reasons. However, the choice of the network abstraction model that will be used to abstract the physical infrastructure represents a major challenge, given that this choice will have a significant impact on what an administrator can see and do. In this article, we present a new domain...
a data center is a pool of resources such as computational, storage facilities, and servers interconnected using a communications network. The Data Center Networking (DCN) holds a pivotal role, and it needs to be scalable and efficient to connect the growing number of servers so as to handle the intensive demands in cloud computing. Recently there has been a rapidly growing literature on DCNs which...
Network tomography is a promising technique to achieve fault management in networks where the existing IP-based troubleshooting mechanism cannot be used. Aiming to apply Boolean network tomography to fault management, various heuristic methods for configuring monitoring trails have been proposed to localize link failures in all-optical mesh networks. However, these existing heuristic methods must...
Service-Oriented Architectures can experience a highly diversified and complex set of interactions between web services for them to compute a response to an incoming service request. Existing approaches based on modelling and control theory are good for strategic and long-term development of a data center resource dimensioning necessary to respond within the boundaries of Service Level Agrements....
This paper shows the evaluation results with the new mesh topology for the Bluetooth Low Energy standard in IoT scenarios where users send values from different monitorization parameters. In this experimentation we have discovered as the user collaboration can increase the benefits of this topology. It is possible to expand the coverage area without adding new BLE nodes making use of the smart devices...
Insider threats are a growing concern for industry, government, and campus networks. Yet, vulnerabilities inherent in Address Resolution Protocol (ARP) are exploitable by insiders seeking to launch sophisticated attacks on local area networks (LANs). Such attacks, initialized through ARP spoofing, include denial of service, server redirect, and man-in-the-middle attacks. Unfortunately, the current...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.