433,687 research outputs found

    File Synchronization Systems Survey

    Full text link
    Several solutions exist for file storage, sharing, and synchronization. Many of them involve a central server, or a collection of servers, that either store the files, or act as a gateway for them to be shared. Some systems take a decentralized approach, wherein interconnected users form a peer-to-peer (P2P) network, and partake in the sharing process: they share the files they possess with others, and can obtain the files owned by other peers. In this paper, we survey various technologies, both cloud-based and P2P-based, that users use to synchronize their files across the network, and discuss their strengths and weaknesses.Comment: The Sixth International Conference on Computer Science, Engineering & Applications (ICCSEA 2016

    Redundancy and Aging of Efficient Multidimensional MDS-Parity Protected Distributed Storage Systems

    Full text link
    The effect of redundancy on the aging of an efficient Maximum Distance Separable (MDS) parity--protected distributed storage system that consists of multidimensional arrays of storage units is explored. In light of the experimental evidences and survey data, this paper develops generalized expressions for the reliability of array storage systems based on more realistic time to failure distributions such as Weibull. For instance, a distributed disk array system is considered in which the array components are disseminated across the network and are subject to independent failure rates. Based on such, generalized closed form hazard rate expressions are derived. These expressions are extended to estimate the asymptotical reliability behavior of large scale storage networks equipped with MDS parity-based protection. Unlike previous studies, a generic hazard rate function is assumed, a generic MDS code for parity generation is used, and an evaluation of the implications of adjustable redundancy level for an efficient distributed storage system is presented. Results of this study are applicable to any erasure correction code as long as it is accompanied with a suitable structure and an appropriate encoding/decoding algorithm such that the MDS property is maintained.Comment: 11 pages, 6 figures, Accepted for publication in IEEE Transactions on Device and Materials Reliability (TDMR), Nov. 201

    Utilization of Battery Energy Storage Systems (BESS) in Smart Grid: A Review

    Get PDF
    The uncertainty in fuel cost, the ageing of most existing grid, the lack of utilities’ supply capacity to respond to the increasing load demand, and the lack of automatically power restoration, accelerate the need to modernize the distribution network by introducing new technologies, putting the smart grid (SG) on spot. The aim of this paper is to carry out a detailed survey of the major requirements of (SG) and discuss the operational challenges arising from the integration of distributed generation (DG) in distribution networks (DN). These requirements dictate the necessity to review the energy and communication infrastructure, the automatic control, metering and monitoring systems, and highlight the features of smart protection system for a robust and efficient distribution grid. In addition, the paper aims to classify the energy storage systems (ESS) and explain their role for utilities, consumers and for environment. This includes the pumped hydro systems (PHS) and compressed air systems (CAS), battery energy storage systems (BESSs), double layer and superconductive capacitors, and electric vehicles (EVs). Since BESSs emerged as one of the most promising technology for several power applications, the paper presents an overview of their main features, management and control systems and operational modes. A survey about the utilization of BESSs in power system is presented

    Mobile Application Security Platforms Survey

    Get PDF
    Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing Unit), Storage and installing numerous applications. Therefore, Security is considered as an important factor in wireless communication technologies, particularly in a wireless ad-hoc network and mobile operating systems. Moreover, based on increasing the range of mobile application within variety of platforms, security is regarded as on the most valuable and considerable debate in terms of issues, trustees, reliabilities and accuracy. This paper aims to introduce a consolidated report of thriving security on mobile application platforms and providing knowledge of vital threats to the users and enterprises. Furthermore, in this paper, various techniques as well as methods for security measurements, analysis and prioritization within the peak of mobile platforms will be presented. Additionally, increases understanding and awareness of security on mobile application platforms to avoid detection, forensics and countermeasures used by the operating systems. Finally, this study also discusses security extensions for popular mobile platforms and analysis for a survey within a recent research in the area of mobile platform security

    Performance-oriented Cloud Provisioning: Taxonomy and Survey

    Full text link
    Cloud computing is being viewed as the technology of today and the future. Through this paradigm, the customers gain access to shared computing resources located in remote data centers that are hosted by cloud providers (CP). This technology allows for provisioning of various resources such as virtual machines (VM), physical machines, processors, memory, network, storage and software as per the needs of customers. Application providers (AP), who are customers of the CP, deploy applications on the cloud infrastructure and then these applications are used by the end-users. To meet the fluctuating application workload demands, dynamic provisioning is essential and this article provides a detailed literature survey of dynamic provisioning within cloud systems with focus on application performance. The well-known types of provisioning and the associated problems are clearly and pictorially explained and the provisioning terminology is clarified. A very detailed and general cloud provisioning classification is presented, which views provisioning from different perspectives, aiding in understanding the process inside-out. Cloud dynamic provisioning is explained by considering resources, stakeholders, techniques, technologies, algorithms, problems, goals and more.Comment: 14 pages, 3 figures, 3 table

    Live migration of user environments across wide area networks

    Get PDF
    A complex challenge in mobile computing is to allow the user to migrate her highly customised environment while moving to a different location and to continue work without interruption. I motivate why this is a highly desirable capability and conduct a survey of the current approaches towards this goal and explain their limitations. I then propose a new architecture to support user mobility by live migration of a user’s operating system instance over the network. Previous work includes the Collective and Internet Suspend/Resume projects that have addressed migration of a user’s environment by suspending the running state and resuming it at a later time. In contrast to previous work, this work addresses live migration of a user’s operating system instance across wide area links. Live migration is done by performing most of the migration while the operating system is still running, achieving very little downtime and preserving all network connectivity. I developed an initial proof of concept of this solution. It relies on migrating whole operating systems using the Xen virtual machine and provides a way to perform live migration of persistent storage as well as the network connections across subnets. These challenges have not been addressed previously in this scenario. In a virtual machine environment, persistent storage is provided by virtual block devices. The architecture supports decentralized virtual block device replication across wide area network links, as well as migrating network connection across subnetworks using the Host Identity Protocol. The proposed architecture is compared against existing solutions and an initial performance evaluation of the prototype implementation is presented, showing that such a solution is a promising step towards true seamless mobility of fully fledged computing environments

    Dendritic subglacial drainage systems in cold glaciers formed by cut-and-closure processes

    Get PDF
    The routing and storage of meltwater and the configuration of drainage systems in glaciers exert a profound influence on glacier behaviour. However, little is known about the hydrological systems of cold glaciers, which form a significant proportion of the total glacier population in the climate sensitive region of the High Arctic. Using glacio-speleological techniques, we obtained direct access to explore and survey three conduit systems and one moulin within the tongue area of Tellbreen, a small cold-based valley glacier in central Spitsbergen. More than 600 m of conduits were surveyed and mapped in plan, profile and cross-section view to analyse the configuration of the drainage system. The investigations revealed that cold-based glaciers can exhibit a dendritic drainage network with supra-, en- and subglacial components formed most likely by cut-and-closure processes as well as surface-to-bed drainage via moulins. Furthermore, we observed that water is stored within the glacier and released gradually via subglacial conduits during the winter months, forming a large and active icing in the proglacial area. The presence of supra-, en- and subglacial components, the surface-to-bed moulin and the dendritic subglacial drainage network suggest that existing models and understanding of the hydrology of cold glaciers needs to be re-evaluated, mostly concerning the different possible pathways and processes that form the hydrological system

    A Survey of Network Coding and Applications

    Full text link
    Common networks with source, internal, and destination nodes put data packets in queues for forwarding.Network coding aims to improve network throughput and energy consumption by combining received data packets before forwarding. In this survey, we will explore various network coding schemes, along with the behavior of network coding in applications. Sensor, wireless routing, and distributed storage networks can benefit greatly from network coding implementations. Flooding is a procedure in distributed systems which broadcasts a message to all nodes in the network. NC-Flooding is introduced, which uses network coding to possibly decrease the message complexity and/or time complexity of flooding
    • …
    corecore