The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article is an extension of this paper1. It describes methods for dealing with reliability and fault tolerance issues in cloud-based datacenters. These methods mainly focus on the elimination of a single point of failure within any component of the cloud infrastructure, availability of infrastructure and accessibility of cloud services. Methods for providing the availability of hardware, software...
In case of safety-critical embedded systems, software must have high availability to provide non-stop and reliable service. Therefore, we want to measure the availability of our system. However, using past methods, it takes a long time to measure availability because of irregular occurrence of faults. In this paper, we present SYNCEYE, which is a kind of fast availability measurement tool. To get...
The paper deals with the problem of optimizing the use of energy in a telecommunication network. We propose the power capping technology to effectively move power hungry tasks from nodes powered from non-renewable energy sources to nodes powered from renewable resources. The presented technology may also be used to optimize OPEX in case the cost of energy varies in different nodes. The presented results...
Cloud services must upgrade continuously in order to maintain competitive. However, a large body of empirical evidence suggests that, upgrade procedures used in practice are failure-prone and often cause planned or unplanned downtime. In this paper, we first define what is cloud service online upgrade, and then we analyze the shortcomings of current mainstream cloud service online upgrade mechanisms...
Primary-backup replication based on shared storage is a classical approach to ensuring high availability and data durability of stock trading systems, but it is difficult to further reduce the system latency due to persistence bottleneck. To solve this problem, a memory data replication approach based on Paxos algorithm is proposed, which accomplishes primary-backup replication through messaging,...
In IPTV networks, channel change latency represents a major obstacle in achieving broadcast-level quality video delivery. Since the content for channels, other than the one currently viewed, is not readily available at the client side, to receive the content corresponding to these channels, each request needs to go through the network, leading to significant, and oftentimes unacceptable, delays. To...
In IPTV networks, channel change latency is a major concern for achieving the desired quality of experience at the subscribers. Since IPTV connections are established over limited capacity links, the number of channels available to each subscriber's use, at any given point in time, is strictly limited. As a direct consequence of this limitation, channel change requests need to go through the IP infrastructure,...
This paper presents HERMES: an energy-efficient data transfer framework for data-center, grid and cloud networks. An architecture and simulations are provided to show that this framework could save more than two-thirds of the energy currently consumed by these networks.
With the fast increased application of SAN, it is required that the characteristics of SAN, such as its heterogeneity, sites' difference, should be transparency to the applications to eliminate the data isolations, realize the simple and uniform management of all storage devices and ensure the security of the data. This paper analyzes realization principle of VxVM virtualization heterogeneity and...
In this paper, we consider Peer-to-Peer Video on- Demand (P2P VoD) systems based on the Bit Torrent file sharing protocol. Since the rarest first policy adopted in the Bit Torrent protocol could not collect all pieces corresponding to a video file by their playback time, we need to develop a new piece selection rule particularly designed for P2P VoDs. In the proposed scheme, we assume the existence...
The numbers of network devices, software, and services to be managed are continuously increasing. Therefore, it has become difficult to manage a network using traditional approaches that rely on human monitoring. A configuration management database (CMDB) is useful for network managers for performing all network management activities. It is an accurate and trusted repository. In this paper, we show...
Clustering solutions are frequently used in large enterprise and mission critical applications with high performance and availability requirements. This is achieved by deploying multiple servers for the purpose of load balancing or by having redundant servers for the purpose of high availability. Most cluster management tools focus on the availability of servers and IP connectivity, and rely on shared...
Key technologies of disaster tolerant intelligent network are briefly introduced at first. After the hot-standby disaster tolerant IN architecture is analyzed, a load-sharing mode is proposed which has no downtime during switchover. By constructing the availability models of local clustered subsystem and the load-sharing disaster tolerant IN system based on birth-death process, it is proved that the...
Networking devices today consume a non-trivial amount of energy and it has been shown that this energy consumption is largely independent of the load through the devices. With a strong need to curtail the rising operational costs of IT infrastructure, there is a tremendous opportunity for introducing energy awareness in the design and operation of enterprise and data center networks. We focus on these...
This paper assesses the availability impact caused by switchover time during database failover. This analysis is essential when switchover time is non-negligible and a stringent availability requirement is applied. How to assess the impact effectively for complex systems through independence assumptions and a hierarchical decomposition modeling approach will be addressed.
The high end of high performance computing (HPC) systems is now moving toward petascale deployments, delivering petaflops of computational capacity and petabytes of storage capacity. Interconnection of the sheer number of server nodes in an HPC system plays a vital role in the developments. InfiniBand has emerged as a compelling interconnect technology, and provides more scalability and significantly...
The interest in system survivability under a variety of attacks, faults or accidents has been on the rise in recent years and survivability is receiving increasing attention as a key property of the mission critical system. Distributed systems are vital for all and it is a critical task to make such systems secure and survive. Survivability in the presence of attacks or failures depends on three key...
In this study, we propose P2TSS, a novel peer-to-peer streaming system which can provide live and time-shifted streams. To achieve time-shifting in a peer-to-peer system, video contents are segmented and spread out in the local caches of participating peers. We present two lightweight distributed cache algorithms: initial play-out position caching and live stream position caching. These algorithms...
Multi-dimensional storage virtualization (MDSV) technology allows multiple virtual disks, each with a distinct combination of capacity, latency and bandwidth requirements, to be multiplexed on a physical disk storage system with performance isolation. This paper presents novel design and implementation techniques that solve the availability guarantee and fairness assurance problems in multi-dimensional...
Under the hypothesis of single failures in the network, some backup paths cannot be active at the same time because they protect against the failure of different components. Hence, share the bandwidth between such backup paths is central to optimize the bandwidth allocated in the network and to decrease the bandwidth wasting. In this paper, we propose a novel algorithm, based on targeted distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.