The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization is an emerging paradigm to allow the creation, at software level, of complex network services by composing simpler ones. However, this paradigm shift exposes network services to faults and bottlenecks in the complex software virtualization infrastructure they rely on. Thus, NFV services require effective anomaly detection systems to detect the occurrence of network...
This paper introduces an approach that handleswith the trustworthy cloud service selection issue in Cloudcomputing environments. Despite the fact that most of theexisting trust systems consider several QoS attributes for trustcomputing, none of them did consider the correlation that mayexist among these attributes. However, we demonstrate in thispaper that the integration of correlation between QoS...
In this paper, we present an approach for automated profiling of cloud-based distributed applications. The failure dependencies within or between application nodes can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation in a node acts as a stimulus which propagates to performance meters of dependent nodes...
The emergence and existence of coverage holes in WSNs will dramatically degrade the network coverage performance and quality of service. To diminish the negative effects of coverage holes, this paper studies the confident information coverage hole detection problem(CICHD) based on the proposed novel confident information coverage model(CIC). For solving the CICHD problem, we design an effective heuristic...
We propose a method for estimating the locations of the causes of failure or deterioration in quality in the service function chains (SFCs) of datacenter networks by using tests packets. Our method is especially effective in service-quality deterioration where no alarms are notified from physical and virtual components. This method models SFC configurations by creating a correlation ID, which identifies...
Understanding the Quality of Experience (QoE) of users is important for network and service providers. Many researches of QoE have been reported where subjective analysis, e.g. in the form of Mean Opinion Score (MOS), for audio/video applications and data services are performed. These studies mainly focus on how users feel while using such applications. In this paper, we focus on how users behave...
This paper presents an analytical model for monitoring and analyzing QoS of publish/subscribe systems on MANET. The proposed customizable model ensures the user a good quality of service requirements and combines both proactive and reactive statistical analysis. In fact, the reactive analysis, suitable for multimedia applications, aims to detect failures by approximating latency series with a Gumbel...
In this paper, we propose a failure prediction methodology for quality of service (QoS) degradation prediction for publish/subscribe systems on MANET. Our propose is to use the Auto Regressive Integrated Moving Average (ARIMA) method to predict failure occurrence in the system and to provide optimal QoS provision of applications. Besides, our forecasting algorithm looks for the source behind QoS degradation...
Many global distributed cloud computing applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of Quality of Service (QoS) in order to deliver and give a sufficiently smooth user experience. This would be essential for real-time streaming multimedia applications like online gaming and watching movies on a pay as you use basis...
LTE (Long Term Evolution) represents an emerging technology that will change how mobility service providers connect user devices to their infrastructure over IP networks. To support growing mobile broadband data loads, an all-IP Ethernet cell site backhaul (CSBH) network infrastructure will make possible real-time high bandwidth applications using mobiles. This paper discusses the changes that LTE...
In the field of service computing, reputation of a Web service is usually calculated using feedback ratings provided by service users. However, the existing of malicious ratings and different preferences of different service users often lead to a bias towards positive or negative ratings. In this paper, we propose a novel reputation measure method for Web services. The proposed method employs two...
Autonomic features can be built into systems by including Self-* properties. There is a dire need to find new techniques of building in Self-* features in networks for delivering important goals like maintaining uptime and QoS, since system adminstrators are crying for help as complexity of networks and their management systems continues to grow unabatedly and managing them effectively and efficiently...
Wireless sensor networks 〈WSNs〉 always have to face the dilemma between limited battery energy and large quantity of data transmission. Breaking data stream into blocks has proved to be an effective way to increase the utilization of the network. However, there is still potential improvement to be achieved to fuse the redundant information, which can be intra-frame or inter-frame. In this article,...
Recently, there has been a tremendous growth in the number of installed distributed computing platforms such as those for content distribution networks, cloud computing infrastructures, and distributed data centers. Such distributed platforms need a scalable end-to-end (e2e) network monitoring component to provide Quality of Service (QoS) guarantees to the services and improve the overall performance...
The scope of this paper is the interdisciplinary measurement and modeling methodology of Quality of Experience (QoE) when playing a mobile location-based massively multiplayer online role-playing game (MMORPG) that places the virtual world on top of the real world using the user's location. The paper introduces the implementation of a re-usable mobile QoE measurement framework on the Android platform...
The presence of multiple services sharing a common functional interface necessitates differentiating between them on the basis of their performance. However advertised quality of service (QoS) alone cannot paint the true picture of how the service has performed so far and how it will continue to function in the near future. This information is crucial for service selection. In this paper, we outline...
This paper proposes the inclusion of two traffic forecasting frameworks in traffic sampling paradigm. The proposed frameworks: namely, the pattern forecasting and the attack forecasting, predicts the occurrence of traffic deviation and examines the existence of malicious attack in the traffic deviation, respectively. While the former utilizes the ARAR model to forecast the network traffic, the latter...
We propose a lightpath establishment technique for transparent optical networks, exploiting the pathcomputationelement (PCE) architecture, which leverages an end-to-end estimation framework called \network krigingrdquo. The scheme relies on the exploitation of probing data from past lightpath establishments to estimate the Quality of Transmission (QoT) of new lightpaths before they are established...
Mobile Ad Hoc Networks are one of the core enabling technologies for tactical environments such as those envisioned in future military operations and disaster relief scenarios. While a significant amount of research has focused on technology interoperability and protocol design, there has been less work addressing the security and information assurance requirements for such environments. Properly...
This paper describes a benchmarking workload model for business process execution language (BPEL) engines for Web services. The proposed model is based on simulation of real world traffic conditions by defining a set of requirements which best characterize the end-users. The performance characteristics are evaluated on top of collected measurements such as success/fail rate, response times or round-trip...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.