The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the role of safety, availability, dependability of Internet of Things (IoT) data services dedicated to the monitoring and control of objects in the physical world. These services are designed to be available to devices and users on request at any time and at any location. The Internet of Things differs from today's global Internet in a number of ways. For instance, the networks...
Availability is one of the key requirements for modern networked system. Availability of a virtualized system can be modelled and analyzed using stochastic models. In our previous work, availability of a virtualized system was modeled using a hierarchical model to incorporate the detailed behavior of virtual machines (VMs)' failure and recovery with respect to the system behavior. In particular, a...
Cloud services must upgrade continuously in order to maintain competitive. However, a large body of empirical evidence suggests that, upgrade procedures used in practice are failure-prone and often cause planned or unplanned downtime. In this paper, we first define what is cloud service online upgrade, and then we analyze the shortcomings of current mainstream cloud service online upgrade mechanisms...
High frequency trading (HFT) environments provide technologies that enable algorithmic trading within automated marketplaces. The most prominent example of an HFT environment is within equity trading, where many millions of trades are achieved at a high volume to gain a reasonable cumulative profit. Such environments rely on low latency/high performance technologies to allow trades to react in a timely...
Applications which are the result of Software Development Life Cycle (SDLC) should be delivered to end users seamlessly. This delivery process which is named as deployment is therefore critical. Especially for systems with ongoing development and frequent deployments, this process should not take a lot of time and create a state of emergency. Also it is important that it is automatized and does not...
One highly-scalable approach to content delivery is to harness the upload bandwidth of the clients. Peer-assisted content delivery systems have been shown to effectively offload the servers of popular files, as the request rates of popular content enable the formation of self-sustaining torrents, where the entire content of the file is available among the peers themselves. However, for less popular...
In traditional telecommunication networks, server resources are statically allocated to session control systems based on demand forecasting. However, the open platform on which third party developers provide various applications has recently made demand prediction difficult. In addition, static allocation concerning load peak results in less resource utilization during nonpeak times, and is not capable...
This paper presents a high-availability solution to a virtualized data center which consists of a cluster of physical servers and hosted virtual machines (VMs). VMs are typically generated through software called virtual machine monitor (VMM) running on physical servers. Both VMs and VMMs face the risks of software aging which are caused by aging-related bugs in the software and may result in failures...
Cloud computing promises customers the on-demand ability to dynamically provision virtualization resources in face of workload variations. Most existing scaling approaches addressed this problem by allocating application to a certain amount of cloud resources. However, the problem of the availability of application influenced by VM-based physical locations during resource scaling process is a serious...
Memory failures are common in clusters, and their destructive effects (e.g., increasing downtime and losing data) make users suffer great loss. Current memory availability strategies mostly require extra expensive hardware. Software approaches based on check pointing technologies intend to reduce the expense, but their high overhead limits the practical usage. In this paper, we present a novel system...
With the technology of geographic information system (GIS) developing and the application of enterprise-level GIS gradually wide, it is necessary to build the high-availability spatial database. Now there are not commercial spatial database software which can realize the high-availability. The paper proposes the architecture of high-availability spatial database based on popular object-relation database...
With inexpensive and stable commodity hardware, virtualization has come of age and is seeing wide implementation. While benefits of virtualization abound, the focus of this paper is on a specific area -- maintaining uninterrupted services. We present a set of functionalities of virtualization software (VMware ESX and Microsoft Hyper-V) that can be used to: (a) provide high availability during planned...
The Service Availability Forum supports the realization of Highly Available systems by means of standards like the Availability Management Framework (AMF), a middleware service that manages the high availability of services provided by applications through the coordination of their redundant components. AMF configurations for applications, capable of providing and protecting services, can be generated...
Several studies have been carried out on software bugs analysis and classification for life and mission critical systems, which include reproducible bugs called Bohrbugs, and hard to reproduce bugs called Mandelbugs. Although software reliability in IT systems has been studied for years, there are only a few formal analytic models for recovery from Mandelbugs. This paper discusses in detail several...
Nowadays, applications must be provided for mobile devices with very different resources. In order to provide the user with a satisfying experience, some of the computation can be offloaded to a remote server. This paper presents an approach for this offloading process for remote data-gathering applications. The set of requirements to be fulfilled by the approach is identified and presented. This...
Cloud computing provide scalability and high availability for web applications using such techniques as distributed caching and clustering. As one database offloading strategy, elastic caching platforms (ECPs) are introduced to speed up the performance or handle application state management with fault tolerance. Several cache strtegies for ECPs have been proposed, say replicated strategy, partitioned...
Increased concerns for electric grid cybersecurity has lead to the development of compliance requirements that must be evaluated by utilities. The North American Electric Reliability Council (NERC) has created Critical Infrastructure Protection (CIP) requirements for all cyber assets supporting the bulk power system[17]. This research explores whether the methodologies and tools commonly used for...
Data center is required for the enterprise, cloud service providers such as Amazon Web Service and Microsoft Azure offer enterprises the ability to store their data remotely on rented hardware per demand. But designing cloud infrastructure in term for securing the data is one of the most concerns that enterprise worries about it. Cost reduction and providing the features as per the demand are the...
By continuous increase of communication solutions usage, network operators must ensure their networks are capable of delivering high quality, innovative services quickly and cost-effectively. Besides, hardware and software vendors face different challenges including increased complexity, tight schedules, shrinking budgets and evolving standards. The open still developing standards, allow abstracting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.