The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High-performance computing, enterprise, and datacenter servers are driving demands for higher total memory capacity as well as memory performance. Memory “cubes” with high per-package capacity (from 3D integration) along with high-speed point-to-point interconnects provide a scalable memory system architecture with the potential to deliver both capacity and performance. Multiple such cubes connected...
Sharding implementations use consistent hashing for distributing a database uniformly across the servers in the topology. Each data item in the database is identified uniquely by a sharding key. The sharding keys are hashed into a hash ring. This hash ring is split into equal sized partitions and each server is allocated an equal number of partitions. Each partition represents a portion of the database,...
The proliferation of web services and the wide choice of Web technologies has resulted in the increasing use of web browsers by service-oriented applications. To decrease the overloading of websites and thus make them more attractive for SOA applications, various solutions to deliver content and resources through web browsers are considered. Among existing approaches, WebRTC is used for the P2P content...
There is a strong focus on the use of Web Real-Time Communication (WebRTC) for many-to-many video conferencing, while the IETF working group has left the signalling issue on the application layer. The main aim of this paper is to create a novel scalable WebRTC signalling mechanism called WebNSM for many-to-many (bi-directional) video conferencing. WebNSM was designed for unlimited users over the mesh...
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they...
Full mesh is the most commonly used networking topology in Web Real-Time Communication (WebRTC) based videoconferencing (VC) applications, however, due to its inherently poor scaling capability it is not appropriate for multi-party VC with many participants. Solutions based on centralized media server infrastructures are used to leverage the scaling problem. Service providers adopting centralized...
Software-Defined Networking (SDN) is an emerging technology that supports recent network applications. An SDN redefines networks by introducing the concept of decoupling the control plane from the data plane, thus providing centralized management, programmability, and dynamic reconfiguration. In this research, we specifically investigate the significance of using SDNs in support of Big-Data applications...
Consistent hashing is used for distributing the data uniformly over a given set of servers in a topology. However, uniform distribution of the data over a given set of servers does not guarantee a uniform distribution of the workload associated with the data over the set of servers. When the workload is skewed over a small subset of data items the traditional re-partitioning approach used for handling...
Cisco DevNet Always-On APIC-EM Sandbox is useful in the phase of learning about software-defined networking, allowing to perform experiments, but without the possibility to change the topology the extent of development is limited. In this paper a Cisco APIC-EM SDN Controller was installed in a private cloud orchestrated by OpenStack. The major objective was to create a virtualized testbed, consisting...
In this era of big data and internet of things, the need for performance improvement in cloud data center is unavoidable. This has led to several designs of data center network topologies with the aim of achieving a data center that has the capability of tolerating fault during multiple failures. In this paper, we proposed improved variants of fat-tree interconnections to mitigate the challenges of...
Server security is necessary to avoid all attack that will happen. IPS (Intrusion Prevention System) is an example of right solution for the security system. IPS can prevent an attack by using the IDS (Intrusion Detection System) and firewall features. In this paper, bro IPS on the server will be tested with some attack include DOS (Denial of Service), port scanning, and ftp brute force to ensure...
In this paper, we propose an OpenFlow-assisted framework for P2P (peer-to-peer) live streaming, which incorporates an OpenFlow-assisted architecture and an OpenFlow-assisted algorithm. The architecture combines the characteristics and advantages of both BitTorrent system and OpenFlow network. The algorithm can dynamically calculate the path and corresponding available bandwidth for each flow according...
Energy consumption has become a key issue for running large-scale data center networks (DCN) nowadays. Previous studies mainly focus on energy saving through reducing the number of active servers or network switches with traffic consolidation. However, since this mechanism benefits from the routing flexibility, both the gained energy savings and flow performance are limited by the conventional static...
Coflow scheduling without prior knowledge has been proposed recently. However, the previous solution, Aalo, has two problems: it does not explicitly control the flow rate; it assumes the network is ideally non-blocking (with perfect traffic balancing and no oversubscription). In this paper, we show the performance loss caused by the above two problems. We propose EAalo to cope with the problems. It...
This paper aims to quantitatively measure the impact of different data centers networking topologies on the performance and energy efficiency of shuffling operations in MapReduce. Mixed Integer Linear Programming (MILP) models are utilized to optimize the shuffling in several data center topologies with electronic, hybrid, and all-optical switching while maximizing the throughput and reducing the...
Service chaining composed of several different virtual network functions (VNFs) constitutes a use case of Network Functions Virtualization (NFV). In a conventional method, the optimal allocation of VNFs and logical paths was resolved by using integer linear programming. However, because the approach did not consider that the required resources of each service differ, the residual resources of the...
Middleboxes (MBs) are ubiquitous in modern data centre (DC) due to their crucial role in implementing network security, management and optimisation. In order to meet network policy's requirement on correct traversal of an ordered sequence of MBs, network administrators rely on static policy based routing or VLAN stitching to steer traffic flows. However, dynamic virtual server migration in virtual...
Many fault-tolerant algorithms are based on decisions made by a quorum of nodes. Since the algorithms are utilised in safety critical applications such as distributed databases, it is necessary to make sure that they operate reliably under every possible scenario. We introduce a generic compositional formalism, based on parameterised labelled transition systems, which allows us to express safety properties...
In modern data centers, many flow-based and task-based schemes have been proposed to speed up the data transmission in order to provide fast, reliable services for millions of users. However, existing flow-based schemes treat all flows in isolation, contributing less to or even hurting user experience due to the stalled flows. Other prevalent task-based approaches, such as centralized and decentralized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.