17 research outputs found

    A Multi-commodity network flow model for cloud service environments

    Get PDF
    Next-generation systems, such as the big data cloud, have to cope with several challenges, e.g., move of excessive amount of data at a dictated speed, and thus, require the investigation of concepts additional to security in order to ensure their orderly function. Resilience is such a concept, which when ensured by systems or networks they are able to provide and maintain an acceptable level of service in the face of various faults and challenges. In this paper, we investigate the multi-commodity flows problem, as a task within our D 2 R 2 +DR resilience strategy, and in the context of big data cloud systems. Specifically, proximal gradient optimization is proposed for determining optimal computation flows since such algorithms are highly attractive for solving big data problems. Many such problems can be formulated as the global consensus optimization ones, and can be solved in a distributed manner by the alternating direction method of multipliers (ADMM) algorithm. Numerical evaluation of the proposed model is carried out in the context of specific deployments of a situation-aware information infrastructure

    Lawson criterion for ignition exceeded in an inertial fusion experiment

    Get PDF
    For more than half a century, researchers around the world have been engaged in attempts to achieve fusion ignition as a proof of principle of various fusion concepts. Following the Lawson criterion, an ignited plasma is one where the fusion heating power is high enough to overcome all the physical processes that cool the fusion plasma, creating a positive thermodynamic feedback loop with rapidly increasing temperature. In inertially confined fusion, ignition is a state where the fusion plasma can begin "burn propagation" into surrounding cold fuel, enabling the possibility of high energy gain. While "scientific breakeven" (i.e., unity target gain) has not yet been achieved (here target gain is 0.72, 1.37 MJ of fusion for 1.92 MJ of laser energy), this Letter reports the first controlled fusion experiment, using laser indirect drive, on the National Ignition Facility to produce capsule gain (here 5.8) and reach ignition by nine different formulations of the Lawson criterion

    Network Virtualization and Survivability of 5G Networks

    No full text

    Improving Network Availability—A Design Perspective

    No full text
    The availability of the resources in communication networks is critical, due to the impact that possible disruptions of communication services may have in the society. Therefore, providing adequate levels of availability for every demand in a network is of paramount importance. In this work, we focus on the topological structure of a network to select a set of links that provide a high availability path to be used by the different end-to-end demands. This set of links constitutes a high availability structure (the spine) and is used as the working path for each demand. The backup path for each demand is edge-disjoint with the corresponding working path. This path pair provides end-to-end protection for critical service demands in the network. An exact formulation of the problem is presented and solved for small instances of networks. A heuristic resolution approach with centrality measures is also put forward, with an experimental study comparing the exact and the approximate results

    Quality Of Service Support For Protocol Processing Within Endsystems

    No full text
    We describe a framework for providing quality-of-service (QoS) guarantees within the endsystem for networked multimedia applications. There are four components in this framework namely---QoS specification, QoS mapping, QoS enforcement, and protocol implementation. QoS specifications are at a high level, and use a small number of parameters to allow applications greater ease in specifying their requirements. Based on the QoS specifications, QoS mapping operations derive resource requirements for each end-to-end session of the application. Important resources considered are the cpu and the network connection. The third component of the framework is QoS enforcement. Enforcement is mainly concerned with providing real-time processing guarantees for protocol code during data transfer. We have implemented a real-time upcall (rtu) facility which is an enhancement to the well known upcall mechanism for structuring protocols. rtus are scheduled using a policy called rate monotonic with delayed..
    corecore