15,465 research outputs found

    MobiThin management framework: design and evaluation

    Get PDF
    In thin client computing, applications are executed on centralized servers. User input (e.g. keystrokes) is sent to a remote server which processes the event and sends the audiovisual output back to the client. This enables execution of complex applications from thin devices. Adopting virtualization technologies on the thin client server brings several advantages, e.g. dedicated environments for each user and interesting facilities such as migration tools. In this paper, a mobile thin client service offered to a large number of mobile users is designed. Pervasive mobile thin client computing requires an intelligent service management to guarantee a high user experience. Due to the dynamic environment, the service management framework has to monitor the environment and intervene when necessary (e.g. adapt thin client protocol settings, move a session from one server to another). A detailed performance analysis of the implemented prototype is presented. It is shown that the prototype can handle up to 700 requests/s to start the mobile thin client service. The prototype can make a decision for up to 700 monitor reports per second

    Live Migration of Virtualized Carrier Grade SIP Server

    Get PDF
    The concept of network virtualization, such as network functions virtualization, has attracted considerable attention from telecom carriers and a live migration technique is a key feature of virtualization technology. However, there are some challenges associated with applying server virtualization technology including live migration to a SIP server. Previous work has not dealt with the performance or behavior of a SIP server during live migration. Neither has it targeted a carrier grade SIP server for live migration. In this paper we present a virtualized carrier grade SIP server running on a virtual machine, which is configured with Carrier Grade Linux, HA middleware and SIP-AS application. We also assess its performance to investigate the impact of throughput degradation and suspension on a SIP layer and HA cluster configuration

    Resource provision in object oriented distributed systems

    Get PDF

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
    • …
    corecore