The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent developments induced by the Internet of Things (IoT) force a paradigm shift to deploy on demand services to a broad range of different computing architectures. Mainly single board computers (SBCs) gained a lot of attraction in recent years, shifting highly available processing power to service consumers and IoT devices. Simultaneously, container virtualization achieved a breakthrough by the...
Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very sophisticated. Usually it uses complex distributed infrastructure an investigation of which is a very challenging task. In the paper, the development of the testbeds toward malware and its infrastructure evaluation is presented. Based on the real-life experience with the subsequent...
Network Functions Virtualization (NFV) has been expected to flexibly compose Virtual Network Functions (VNFs) by virtualizing existing network appliances and logically chaining them. Currently used VNFs are realized as VM-based appliances and shared by multiple users (VMs). However, the notion of NFV can be extended to reinforce network functionality of user VMs by introducing VM-dedicated VNFs. In...
The maturity of hardware virtualization has motivated communication service providers to apply this paradigm to network services. Virtual Network Functions (VNFs) come from this motivation and refer to any virtual execution environment configured to provide a given network service. VNFs constitute a new paradigm and related dependability evaluation mechanisms are still not thoroughly defined. In this...
Monitoring the activity of equipment in datacenters is often a key element in designing large scale network and IT infrastructure. The information collected by direct parameter observations (such as total network traffic, CPU usage, etc.) represents a first step in the overall system performance optimization. A second one is denoted by data analytics and decision making strategies based on the values...
Consolidation is an approach that optimizes the utilization of the computing resources. Many datacenter virtualization solutions employ it to reduce the number of physical machines (PMs), and thus save money on hardware, cooling, and electricity. Resources oversubscription, as an effective resource management policy is used to free idle resource in cloud. More virtual machines (VMs) can host in the...
In recent years, there has been a rapid growth of interest in dynamic management of resources in virtualized systems. Virtualization provides great flexibility in terms of resource sharing but at the same time it also brings new challenges for load balancing using automatic migrations of virtual machines. In this paper, we have evaluated VMware's Distributed Resource Scheduler (DRS) in a number of...
Cyber-physical systems (CPS) are large scale systems highly integrated with the physical environment. Given the changing nature of physical environments, CPS must be able to adapt on-line to new situations while preserving their correct operation. Correctness by construction relies on using formal tools, which suffer from a considerable computationaloverhead especially if executed on-line. As the...
Simple Network Management Protocol (SNMP) is the protocol which has the capability to monitor the performance of IP based devices. Also it can monitor components installed on these devices to determine whether they are working or not. In an environment with hundreds of installed servers, it is not possible to check if each machine is working properly. SNMP can also be a used in cloud computing environment...
Softwarization of network functions running on commodity servers, switches, and storage by leveraging standard IT virtualization and cloud technologies has become a goal of communications service providers (CSPs). Management and orchestration (MANO) is crucial for achieving this network functions virtualization (NFV) vision. We propose an open platform for NFV that exposes APIs that can be consumed...
Transparent Internet Caching is a solution that enables the service provider to offload a significant amount of content in a cached copy of the popular content close to the edge of the network, which is delivered to an end-user directly from the edge of the network rather than from the source. We propose state-driven TIC service orchestration over the decomposed service functions based on NFV and...
As a platform for cloud services and high performance computing, cluster systems are primarily used. As the scale of the cluster system is increasing more and more and the use of heterogeneous nodes equipped with various hardware is increased, it is becoming more difficult and exhausting in time and cost to manage a cluster system in a conventional manner. In this paper, we design self-provisioning...
In Cloud technologies, monitoring is core element of electronic communication device for optimization. Recently OpenStack open monitoring source code (ceilometer) to the public. Ceilometer project monitors and meters the OpenStack cloud for billing, benchmarking, scalability, and statistical purposes. Analysis of Cloud monitoring, is compared with Network function monitoring.
Since the cloud computing was proposed, the research of cloud instantaneously swept the world and all kinds of cloud products have appeared in public eyes. But if the cloud platform security is not guaranteed, companies or individuals will not run and store their own data in the cloud, especially since the Hollywood nude-picture scandal event put the cloud computing to the point of a struggle. So...
Virtual machine (VM) management in cloud data center is an important problem that remains to be effectively addressed. There has been a considerable amount of work investigating the management of physical-to-virtual resource mappings to improve the efficiencies of resource usage and power consumption in data center. However, these different management objectives are conflicting. One solution can't...
With rapid progress in information and communication technology (ICT), the existing communication infrastructure has been continually evolving. Telecommunication network operators may need to expand hardware and software infrastructure to adopt new communication technologies, which will require considerable capital investments. In addition, devices for Internet of Things (IoT) are being rapidly adopted...
Traffic monitoring is the essential capability for large-scale enterprises, data centers, service providers, and network operators to ensure reliability, availability, fault assurance, and security of their underlying network resources. Currently, most monitoring solutions are standalone dedicated ones. Major drawbacks of these dedicated standalone appliances per-feature are high-cost, lack of flexibility,...
We present a data center service localization architecture based on virtual resource migration in software defined elastic optical network. The overall feasibility and efficiency of the proposed architecture are experimentally verified on our testbed.
A non-invasive, cloud-agnostic approach is demonstrated for extending existing cloud platforms to include checkpoint-restart capability. Most cloud platforms currently rely on each application to provide its own fault tolerance. A uniform mechanism within the cloud itself serves two purposes: (a) direct support for long-running jobs, which would otherwise require a custom fault-tolerant mechanism...
Network function virtualization introduces additional complexity for network management through the use of virtualization environments. The amount of managed data and the operational complexity increases, which makes service assurance and failure recovery harder to realize. In response to this challenge, the paper proposes a distributed management function, called virtualized network management function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.