433,687 research outputs found
File Synchronization Systems Survey
Several solutions exist for file storage, sharing, and synchronization. Many
of them involve a central server, or a collection of servers, that either store
the files, or act as a gateway for them to be shared. Some systems take a
decentralized approach, wherein interconnected users form a peer-to-peer (P2P)
network, and partake in the sharing process: they share the files they possess
with others, and can obtain the files owned by other peers. In this paper, we
survey various technologies, both cloud-based and P2P-based, that users use to
synchronize their files across the network, and discuss their strengths and
weaknesses.Comment: The Sixth International Conference on Computer Science, Engineering &
Applications (ICCSEA 2016
Redundancy and Aging of Efficient Multidimensional MDS-Parity Protected Distributed Storage Systems
The effect of redundancy on the aging of an efficient Maximum Distance
Separable (MDS) parity--protected distributed storage system that consists of
multidimensional arrays of storage units is explored. In light of the
experimental evidences and survey data, this paper develops generalized
expressions for the reliability of array storage systems based on more
realistic time to failure distributions such as Weibull. For instance, a
distributed disk array system is considered in which the array components are
disseminated across the network and are subject to independent failure rates.
Based on such, generalized closed form hazard rate expressions are derived.
These expressions are extended to estimate the asymptotical reliability
behavior of large scale storage networks equipped with MDS parity-based
protection. Unlike previous studies, a generic hazard rate function is assumed,
a generic MDS code for parity generation is used, and an evaluation of the
implications of adjustable redundancy level for an efficient distributed
storage system is presented. Results of this study are applicable to any
erasure correction code as long as it is accompanied with a suitable structure
and an appropriate encoding/decoding algorithm such that the MDS property is
maintained.Comment: 11 pages, 6 figures, Accepted for publication in IEEE Transactions on
Device and Materials Reliability (TDMR), Nov. 201
Utilization of Battery Energy Storage Systems (BESS) in Smart Grid: A Review
The uncertainty in fuel cost, the ageing of most existing grid, the lack of utilities’ supply capacity to respond to the increasing load demand, and the lack of automatically power restoration, accelerate the need to modernize the distribution network by introducing new technologies, putting the smart grid (SG) on spot. The aim of this paper is to carry out a detailed survey of the major requirements of (SG) and discuss the operational challenges arising from the integration of distributed generation (DG) in distribution networks (DN). These requirements dictate the necessity to review the energy and communication infrastructure, the automatic control, metering and monitoring systems, and highlight the features of smart protection system for a robust and efficient distribution grid. In addition, the paper aims to classify the energy storage systems (ESS) and explain their role for utilities, consumers and for environment. This includes the pumped hydro systems (PHS) and compressed air systems (CAS), battery energy storage systems (BESSs), double layer and superconductive capacitors, and electric vehicles (EVs). Since BESSs emerged as one of the most promising technology for several power applications, the paper presents an overview of their main features, management and control systems and operational modes. A survey about the utilization of BESSs in power system is presented
Mobile Application Security Platforms Survey
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security
Performance-oriented Cloud Provisioning: Taxonomy and Survey
Cloud computing is being viewed as the technology of today and the future.
Through this paradigm, the customers gain access to shared computing resources
located in remote data centers that are hosted by cloud providers (CP). This
technology allows for provisioning of various resources such as virtual
machines (VM), physical machines, processors, memory, network, storage and
software as per the needs of customers. Application providers (AP), who are
customers of the CP, deploy applications on the cloud infrastructure and then
these applications are used by the end-users. To meet the fluctuating
application workload demands, dynamic provisioning is essential and this
article provides a detailed literature survey of dynamic provisioning within
cloud systems with focus on application performance. The well-known types of
provisioning and the associated problems are clearly and pictorially explained
and the provisioning terminology is clarified. A very detailed and general
cloud provisioning classification is presented, which views provisioning from
different perspectives, aiding in understanding the process inside-out. Cloud
dynamic provisioning is explained by considering resources, stakeholders,
techniques, technologies, algorithms, problems, goals and more.Comment: 14 pages, 3 figures, 3 table
Live migration of user environments across wide area networks
A complex challenge in mobile computing is to allow the user to migrate her highly customised environment while moving to a different location and to continue work without interruption. I motivate why this is a highly desirable capability and conduct a survey of the current approaches towards this goal and explain their limitations. I then propose a new architecture to support user mobility by live migration of a user’s operating system instance over the network. Previous work includes the Collective and Internet Suspend/Resume projects that have addressed migration of a user’s environment by suspending the running state and resuming it at a later time. In contrast to previous work, this work addresses live migration of a user’s operating system instance across wide area links. Live migration is done by performing most of the migration while the operating system is still running, achieving very little downtime and preserving all network connectivity.
I developed an initial proof of concept of this solution. It relies on migrating whole operating systems using the Xen virtual machine and provides a way to perform live migration of persistent storage as well as the network connections across subnets. These challenges have not been addressed previously in this scenario. In a virtual machine environment, persistent storage is provided by virtual block devices. The architecture supports decentralized virtual block device replication across wide area network links, as well as migrating network connection across subnetworks using the Host Identity Protocol. The proposed architecture is compared against existing solutions and an initial performance evaluation of the prototype implementation is presented, showing that such a solution is a promising step towards true seamless mobility of fully fledged computing environments
Dendritic subglacial drainage systems in cold glaciers formed by cut-and-closure processes
The routing and storage of meltwater and the configuration of drainage systems in glaciers exert a profound influence on glacier behaviour. However, little is known about the hydrological systems of cold glaciers, which form a significant proportion of the total glacier population in the climate sensitive region of the High Arctic. Using glacio-speleological techniques, we obtained direct access to explore and survey three conduit systems and one moulin within the tongue area of Tellbreen, a small cold-based valley glacier in central Spitsbergen. More than 600 m of conduits were surveyed and mapped in plan, profile and cross-section view to analyse the configuration of the drainage system. The investigations revealed that cold-based glaciers can exhibit a dendritic drainage network with supra-, en- and subglacial components formed most likely by cut-and-closure processes as well as surface-to-bed drainage via moulins. Furthermore, we observed that water is stored within the glacier and released gradually via subglacial conduits during the winter months, forming a large and active icing in the proglacial area. The presence of supra-, en- and subglacial components, the surface-to-bed moulin and the dendritic subglacial drainage network suggest that existing models and understanding of the hydrology of cold glaciers needs to be re-evaluated, mostly concerning the different possible pathways and processes that form the hydrological system
A Survey of Network Coding and Applications
Common networks with source, internal, and destination nodes put data packets in queues for forwarding.Network coding aims to improve network throughput and energy consumption by combining received data packets before forwarding. In this survey, we will explore various network coding schemes, along with the behavior of network coding in applications. Sensor, wireless routing, and distributed storage networks can benefit greatly from network coding implementations. Flooding is a procedure in distributed systems which broadcasts a message to all nodes in the network. NC-Flooding is introduced, which uses network coding to possibly decrease the message complexity and/or time complexity of flooding
- …