The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network...
Live migration of virtual network functions (VNF) is a powerful technique with benefits of server maintenance, resource management and dynamic workload re-balance, among others. Downtime and total migration time are mainly two vital indicators to describe the performance of the VNF live migration (VLM). Modern research has effectively reduced the downtime to zero for some specific VNFs (eg. virtual...
Failure prevention and protection are very critical issues nowadays. Although there are many commercial high availability (HA) solutions, they are expensive and do not support intelligent platform management interface (IPMI) that can improves failure detection efficiency. We present NCU-HA, a HA solution based on the open source project KVM(Kernel-based Virtual Machine). NCU-HA can be run on both...
Availability is one of the key requirements for modern networked system. Availability of a virtualized system can be modelled and analyzed using stochastic models. In our previous work, availability of a virtualized system was modeled using a hierarchical model to incorporate the detailed behavior of virtual machines (VMs)' failure and recovery with respect to the system behavior. In particular, a...
Educational Universities are gradually enhancing the traditional delivery mode towards blended learning, virtual classrooms and distance learning with the help of technology to reach the various demands of programs needed by people around the world. Learners are looking for specific programs of their interest, regardless of the location. Modern learning trends depend more on the technology and electronic...
The resource allocation is an essential aspect of Data Center performance. The strategy between dynamic and dedicated resource allocation have objectives in performance and reliability. The performance consists of workload, usage, and processing performance. The study works in workload performance test in dynamic resource allocation. The research present the correlation between load handling memory...
SDI (Software Defined Infrastructure) provides virtualized infrastructures to customers by slicing computing resources and network resources. One of the important problems for deploying SDI framework is to control the assignment of physical resources to a virtual network against changes of traffic demand and service demand. For this problem, VNE (Virtual Network Embedding) problem that maps a virtual...
Planning for a network is important for deployment of any network. For large capacity network, planning has to be done to increase efficiency and therefore setting up a test-bed to perform even a basic test would be really difficult. Planning tool will give a mirror image of the actual network, thereby ensuring that there are no gaps in what is being planned and what is being deployed. The software...
Electronic business course at Zagreb School of Economics and Managements (higher education economy faculty) is highly practical course with aim to educate students how to use variety of open source information systems for online business purposes. As final project students have to use open source content management system and implement their own business idea using principles taught in theoretical...
New flexible network environments emerged in the last years, such as the Software-Defined Networks, the Network Function Virtualization and the various network slicing technologies. Their main goal is to satisfy and to flexibly cope with the changing requirements of both users and service / infrastructure providers with respect to the constraints of physical resources, the frequently changing network...
In order to support the remote training of Mission Critical Operators, a standard interface and interconnection architecture had to be developed. While many others have created schemes for remote operation of equipment, many tend to either be customized to a target hardware, lack the requisite security protocols, or not be scalable. We have created such an architecture, leveraging existing commercial...
Network, Storage, Resources, Application services monitoring is becoming increasingly important for provision of QoS (Quality of services) in IT. So to manage the huge data centers servers resources and installed application on it required more human resources and time to check every server status by login to it. So in this paper we are introducing the new network and application services monitoring...
The virtualization technology has been widely used in today's doud computing datacenters. With the virtualization technology, each physical machine in a datacenter can be logically divided into several virtual machines, on which different types of software services can host. However, many reasons may decrease the availability of the whole system. For example, a failed physical machine automatically...
Due to the popularity of cloud computing and the increase of cloud-service requests, the demand for building better cloud infrastructure is huge. However, many services that need to be provided by a cloud infrastructure are not currently available. Efficient power consumption is an example. On the other hand, the usage of some cloud services is low. But their servers keep online and working, causing...
Informatization is the ultimate way out for audit method in China. In order to improve audit quality, the auditee's information system always needs to be restored on the auditors' environment by re-installing them. The kind of audit model brings great pressure to the auditors, not only is the heavy workload at each audit project, but also there is incompatibility problems between different operating...
We present a data center service localization architecture based on virtual resource migration in software defined elastic optical network. The overall feasibility and efficiency of the proposed architecture are experimentally verified on our testbed.
A major advantage of cloud environments is that one can balance the load by migrating virtual machines (VMs) from one server to another. High performance and high resource utilization are also important in a cloud. We have observed that over-allocation of virtual CPUs to VMs (i.e. allocating more vCPUs to VMs than there CPU cores on the server) when there are many VMs running on one host can reduce...
Virtualization technologies are being actively used to design infrastructure of cloud computing systems. In this case applications can be duplicated and hosted in different virtual machines on different physical nodes. That defines various performance of applications which causes the problem of managing performance of the entire heterogeneous system. There are different ways of solving this problem,...
A dedicated networking laboratory is used by students on a computer networking degree program so that they can undertake practical work without affecting the main University network. Images of the laboratory computers are maintained on a server and deployed when major updates or reconfigurations of the computers are required. Improvements can be made in the configuration and management processes....
This paper describes the design and delivery of two competition-based small offensive security exercises in an undergraduate Computer and Information Security course at the Faculty of Computing and Information Technology, King Abdulaziz University. We designed competition scenarios for two small exercises based on known attacks. The first exercise aimed to break the Windows Server 2008 password, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.