280 research outputs found

    Distributed workload and response time management for web applications

    Get PDF
    Abstract-Managing workload for large scale web applications is a fundamental task for satisfactory quality of service, low management and operation cost. In this paper, we present SCOPS, a system of distributed workload management to achieve service differentiation and overload protection in such large scale deployment. Our system splits the workload management logic into distributed components on each back-end server and frontend proxy. The control solution is designed to protect the backend server from overloading and to achieve both efficient usage of system resource and service differentiation by employing a unique optimization target. The control components are automatically organized based on the flow of workloads, such that management overhead is minimized. SCOPS is extremely flexible because it requires no source code changes to host OS, application servers, or web applications. Additionally, the distributed design makes it scalable and robust for cloud scale server deployment. Experiments with our implementation confirm SCOPS's performance with dynamic heavy workload, incurring neglectable runtime overhead. More importantly, SCOPS also ensures fault-tolerance and fast convergence to system failures

    Flow-oriented anomaly-based detection of denial of service attacks with flow-control-assisted mitigation

    Get PDF
    Flooding-based distributed denial-of-service (DDoS) attacks present a serious and major threat to the targeted enterprises and hosts. Current protection technologies are still largely inadequate in mitigating such attacks, especially if they are large-scale. In this doctoral dissertation, the Computer Network Management and Control System (CNMCS) is proposed and investigated; it consists of the Flow-based Network Intrusion Detection System (FNIDS), the Flow-based Congestion Control (FCC) System, and the Server Bandwidth Management System (SBMS). These components form a composite defense system intended to protect against DDoS flooding attacks. The system as a whole adopts a flow-oriented and anomaly-based approach to the detection of these attacks, as well as a control-theoretic approach to adjust the flow rate of every link to sustain the high priority flow-rates at their desired level. The results showed that the misclassification rates of FNIDS are low, less than 0.1%, for the investigated DDOS attacks, while the fine-grained service differentiation and resource isolation provided within the FCC comprise a novel and powerful built-in protection mechanism that helps mitigate DDoS attacks

    A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research

    Full text link
    With traditional networking, users can configure control plane protocols to match the specific network configuration, but without the ability to fundamentally change the underlying algorithms. With SDN, the users may provide their own control plane, that can control network devices through their data plane APIs. Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane APIs which may be leveraged by user-defined SDN control. Thus, programmable data planes and SDN offer great flexibility for network customization, be it for specialized, commercial appliances, e.g., in 5G or data center networks, or for rapid prototyping in industrial and academic research. Programming protocol-independent packet processors (P4) has emerged as the currently most widespread abstraction, programming language, and concept for data plane programming. It is developed and standardized by an open community and it is supported by various software and hardware platforms. In this paper, we survey the literature from 2015 to 2020 on data plane programming with P4. Our survey covers 497 references of which 367 are scientific publications. We organize our work into two parts. In the first part, we give an overview of data plane programming models, the programming language, architectures, compilers, targets, and data plane APIs. We also consider research efforts to advance P4 technology. In the second part, we analyze a large body of literature considering P4-based applied research. We categorize 241 research papers into different application domains, summarize their contributions, and extract prototypes, target platforms, and source code availability.Comment: Submitted to IEEE Communications Surveys and Tutorials (COMS) on 2021-01-2

    The new enhancement of UMTS: HSDPA and HSUPA

    Get PDF
    During the last two decades, the world of the mobile communications grew a lot, as a consequence of the increasing necessity of people to communicate. Now, the mobile communications still need to improve for satisfies the user demands. The new enhancement of UMTS in concrete HSDPA and HSUPA is one of these improvements that the society needs. HSDPA and HSUPA which together are called HSPA, give to the users higher data rates in downlink and uplink. The higher data rates permit to the operators give more different types of services and at the same time with better quality. As a result, people can do several new applications with their mobile terminals like applications that before a computer and internet connection were required, now it is possible to do directly with the mobile terminal. This thesis consists in study these new technologies denominated HSDPA and HSUPA and thus know better the last tendencies in the mobile communications. Also it has a roughly idea about the future tendencies

    The 1st International Conference on Computational Engineering and Intelligent Systems

    Get PDF
    Computational engineering, artificial intelligence and smart systems constitute a hot multidisciplinary topic contrasting computer science, engineering and applied mathematics that created a variety of fascinating intelligent systems. Computational engineering encloses fundamental engineering and science blended with the advanced knowledge of mathematics, algorithms and computer languages. It is concerned with the modeling and simulation of complex systems and data processing methods. Computing and artificial intelligence lead to smart systems that are advanced machines designed to fulfill certain specifications. This proceedings book is a collection of papers presented at the first International Conference on Computational Engineering and Intelligent Systems (ICCEIS2021), held online in the period December 10-12, 2021. The collection offers a wide scope of engineering topics, including smart grids, intelligent control, artificial intelligence, optimization, microelectronics and telecommunication systems. The contributions included in this book are of high quality, present details concerning the topics in a succinct way, and can be used as excellent reference and support for readers regarding the field of computational engineering, artificial intelligence and smart system

    SIGNALING OVERLOAD CONTROL FORWIRELESS CELLULAR NETWORKS

    Get PDF
    As the worldwide market of cellular phone increases, many subscribers have come to rely on cellular phone services. In catastrophes or mass call in situations, the load can be greater than what the cellular network can support, and the entire network may become completely non-functional. This raises serious concerns on the survivability of wireless cellular networks in order to provide necessary services such as 911 calls in those circumstances. In high load cases, overload control must be deployed to reserve network resource for emergency traffic and maintenance services. Over the past several years, many catastrophes have revealed the deficiencies of the existing overload control mechanisms in cellular networks. Improvement to the existing overload controls are needed in order to cope with unexpected situations. A key to the survivability of wireless cellular networks lies in the signaling services from database servers that support a call connection throughout its duration (e.g., for monitoring users' locations and supplying authentication codes for secure communications), this dissertation focuses on the overload control at the database servers.As loss of different signaling services impacts a user's perception differently, the overload controlis proposed to provide differentiation and guaranteed classes of signaling services. Specifically, multi-class token rate controls are proposed due to theirs flexibility in various network configurations and advantages over other controls such as, percentage blocking and call gapping. The concept of adaptive control decision is used so that the proposed controls react quickly to changes in the load. A simulation based performance evaluation of the proposed control is conducted and compared with existing controls. It is shown that the proposed controls outperform the existing multi-class token based controls due to various reasons. First, the proposed controls use adaptive resourcesharing that guarantees a lower bound, where the percentage of resource sharing among classesis adaptively set. The existing token rate controls either distribute resource among classes usingstatic ratios or completely share resources among classes. Although using static ratios guarantees the quality of service within each class, it lowers the total utilization of the server. Whereas,allowing a complete resource sharing among classes may cause large load fluctuations in each class. Second, the proposed controls use the novel concept of integrating information on the availability of the radio resources into the control decision, allowing servers to save theirs resources from serving signaling that later on might be dropped due to unavailable radio resources
    corecore