70,885 research outputs found

    Torii HLMAC: distributed, fault-tolerant, zero configuration data center architecture with multiple tree-based addressing and forwarding

    Get PDF
    Proceedings of: 7th International Conference on emerging Networking EXperiments and Technologies (CoNEXT). ACM CoNEXT 2011 Student Workshop. Tokyo, Japan, December 6-9, 2011.This paper describes Torii-HLMAC a scalable, fault-tolerant, zero-configuration data center network fabric architecture (currently under final evaluation) as a full distributed alternative to Portland for similar multiple tree (fat tree) network topologies. It uses multiple, fixed, tree-based positional MAC addresses, used for multiple path table-free forwarding. Addresses are assigned by simple extension of the Rapid Spanning Tree Protocol. Torii-HLMAC enhances the Portland protocol advantages of scalability, zero configuration and high performance and adds instant path recovery, distributed address assignment. ARP broadcast may use ARP Proxy.This work is supported in part by grants from Comunidad de Madrid and Comunidad de Castilla la Mancha through Projects MEDIANET-CM (S-2009/TIC- 1468) and EMARECE (PII1I09-0204-4319).Publicad

    Design and Implementation of UPnP-based Energy Gateway for Demand Side Management in Smart Grid

    Get PDF
    Legacy electrical grids are urged to evolve towards smart grids, the smarter power delivery system that relies heavily on ICT. Numerous smart grids applications are expected to be developed for efficient management and utilization of electricity at the demand side such as home automation, Advanced Metering Infrastructure (AMI), dynamic energy pricing, efficient load management, etc. For easing and boosting the development of new demand side services, the concept of Home Energy Gateway (HEG) has recently been proposed in literature. It involves communication with the utility as well as with devices at the consumer sites. The literature still lacks a comprehensive HEG design that could provide all essential features such as zero-configuration, auto-discovery, seamless plug & play communication, interoperability and integration, customers privacy and communication security.This paper addresses the HEG challenges in an effective way through the design of suitable communication frameworks and a security mechanism for enabling strong protection against cyber attacks. The proposed system effectively copes with the interoperability and integration issues between plethora of heterogeneous devices at the consumer sites. The devices in proposed system inherit plug & play features and support zero-configuration and seamless networking. Further, the proposed system design is technology-agnostic and flexible enough to be adopted for the implementation of any specific demand side service. This paper also evaluates the proposed system in real-networking environment and presents performance metrics

    Bulut cihazların otomatik konfigürasyon yöntemlerinin karşılaştırılması

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Bu çalışmada, bulutla uyumlu çalışan ağ bağlantılı akıllı cihazların otomatik yapılandırması için kullanılan sıfır yapılandırmalı ağ oluşturma tekniğinin kullanıldığı Hizmet Keşif Protokolleri araştırılmıştır. Bu protokollerin çalışma prensipleri incelenmiş ve protokoller arasında karşılaştırma yapılmıştır. Bu tez kapsamında, genel bir giriş yapıldıktan sonra, ikinci bölümde bulut bilişimin tanımlarından, bulut bilişimin karakteristik özelliklerinden, servis ve yayılım modellerinden bahsedilmiştir. Üçüncü bölümde; bulutla uyumlu cihazlara değinilmiş ve bu cihazların temelinde yer alan, nesnelerin interneti teknolojisi tanımlanmıştır. Bu teknolojiyi oluşturan ağ bağlantılı akıllı cihazların otomatik konfigurasyonunu sağlayan sıfır konfigurasyonlu ağ oluşturma tekniği ve bu tekniğin uygulandığı yöntemler açıklanmıştır. Bu yöntemler temel işlem basamaklarına ve genel özelliklerine göre karşılaştırılmıştır. Dördüncü bölümde ise Sıfır Yapılandırmalı Ağ Oluşturma teknolojisinin kullanıldığı ve kullanılmadığı örnek uygulamalara yer verilmiştir. Son olarak yapılan araştırma ve incelenen örnekler doğrultusunda elde edilen sonuçlar ve öneriler sunulmuştur. Araştırmada elde edilen bulgulara göre; sıfır yapılandırmalı ağ oluşturma teknolojisinde güvenlik konusunda eksikler olduğu, hala geliştirilmeye açık olduğu ve uzun sure daha literatürde tazeliğini koruyacağı sonucuna varılmıştır.In this study, service discovery protocols that use the zero configurations networking for automatic configuration of cloud-enabled networked smart devices were investigated. The operation principles of these service discovery protocols were examined and comparisons are made between these protocols. In the scope of the thesis, after a general introduction, in second chapter definitions of Cloud computing, characteristics of cloud computing, service and deployment models are mentioned. In third chapter; the cloud compatible devices are mentioned and Internet of Things, the technology located in the base of these devices is identified. Zero-configuration networking technology which allows automatic configuration of the networked smart devices that made up Internet of Things and the implementations of this technology are explained. These methods were compared with respect to their general characteristics and basic processing steps. In the fourth chapter the use of Zero Configuration Networking technology applications has given. Finally, the results obtained according to the investigated and analyzed examples are presented. According to the findings obtained in the study; It is missing about security in zero-configuration networking technology and it is still open to development. Also it has concluded that this topic will protect its freshness in the literature more prolonge

    Estimating Dynamic Traffic Matrices by using Viable Routing Changes

    Get PDF
    Abstract: In this paper we propose a new approach for dealing with the ill-posed nature of traffic matrix estimation. We present three solution enhancers: an algorithm for deliberately changing link weights to obtain additional information that can make the underlying linear system full rank; a cyclo-stationary model to capture both long-term and short-term traffic variability, and a method for estimating the variance of origin-destination (OD) flows. We show how these three elements can be combined into a comprehensive traffic matrix estimation procedure that dramatically reduces the errors compared to existing methods. We demonstrate that our variance estimates can be used to identify the elephant OD flows, and we thus propose a variant of our algorithm that addresses the problem of estimating only the heavy flows in a traffic matrix. One of our key findings is that by focusing only on heavy flows, we can simplify the measurement and estimation procedure so as to render it more practical. Although there is a tradeoff between practicality and accuracy, we find that increasing the rank is so helpful that we can nevertheless keep the average errors consistently below the 10% carrier target error rate. We validate the effectiveness of our methodology and the intuition behind it using commercial traffic matrix data from Sprint's Tier-1 backbon

    Energy management in communication networks: a journey through modelling and optimization glasses

    Full text link
    The widespread proliferation of Internet and wireless applications has produced a significant increase of ICT energy footprint. As a response, in the last five years, significant efforts have been undertaken to include energy-awareness into network management. Several green networking frameworks have been proposed by carefully managing the network routing and the power state of network devices. Even though approaches proposed differ based on network technologies and sleep modes of nodes and interfaces, they all aim at tailoring the active network resources to the varying traffic needs in order to minimize energy consumption. From a modeling point of view, this has several commonalities with classical network design and routing problems, even if with different objectives and in a dynamic context. With most researchers focused on addressing the complex and crucial technological aspects of green networking schemes, there has been so far little attention on understanding the modeling similarities and differences of proposed solutions. This paper fills the gap surveying the literature with optimization modeling glasses, following a tutorial approach that guides through the different components of the models with a unified symbolism. A detailed classification of the previous work based on the modeling issues included is also proposed
    corecore