NETWORK INTERACTION IN VIRTUALIZED ENVIRONMENTS AND FEATURES OF VIRTUAL STAND DEVELOPMENT

Author(s):  
E. M. Golubkova ◽  
A. M. Kruglov ◽  
A. A. Vereshchagin

This article describes a virtual bench developed by the authors for studying network interaction in virtualization and containerization environments. The functional diagrams of the two modules of the stand are presented, as well as the exact characteristics of the software and hardware used in the work. The study of network interaction is carried out in a certain complex of proprietary and free software, which distinguishes it from previous studies. To build a virtual stand, the VMWare system was used, with the help of which 2 stand modules were created. The hypothesis of the research is that installed DPDK libraries on hosts and VMs and containers, as well as configuring OvS will increase network performance, which includes bandwidth and latency parameters. Network research is carried out in two modes of operation using the software switch Open vSwitch and DPDK libraries. The results of the study and the authors recommendations are given at the end of the work. Also, the key features of configuring virtual machines, containers and software switch, which are the main objects of research, were described. Further research on the topic involves defining a set of best practices for configuring all components of the network infrastructure (including the number of numa nodes, cpu pinning topology and the amount of huge pages), and making recommendations for choosing the main parameters of VMs and containers.

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 726
Author(s):  
Francisco J. Gómez-Uceda ◽  
José Ramirez-Faz ◽  
Marta Varo-Martinez ◽  
Luis Manuel Fernández-Ahumada

In this work, an omnidirectional sensor that enables identification of the direction of the celestial sphere with maximum solar irradiance is presented. The sensor, based on instantaneous measurements, functions as a position server for dual-axis solar trackers in photovoltaic plants. The proposed device has been developed with free software and hardware, which makes it a pioneering solution because it is open and accessible as well as capable of being improved by the scientific community, thereby contributing to the rapid advancement of technology. In addition, the device includes an algorithm developed ex professo that makes it possible to predetermine the regions of the celestial sphere for which, according to the geometric characteristics of the PV plant, there would be shading between the panels. In this way, solar trackers do not have to locate the Sun’s position at all times according to astronomical models, while taking into account factors such as shadows or cloudiness that also affect levels of incident irradiance on solar collectors. Therefore, with this device, it is possible to provide photovoltaic plants with dual-axis solar tracking with a low-cost device that helps to optimise the trajectory of the trackers and, consequently, their radiative capture and energy production.


2021 ◽  
Vol 27 (10) ◽  
pp. 804-815
Author(s):  
O. V. Vardanyan ◽  
T. N. Kosheleva

Aim. The presented study aims to identify the key features of best practices in the organization of advance notification by analyzing advance notification practices in the European Union (EU) and Japan.Tasks. The authors analyze the organization of advance notification in the EU and Japan, identify the key features of best practices in the organization of advance notification, and formulate recommendations for Russian customs authorities.Methods. This study uses general scientific methods (analysis, synthesis, comparison) and special scientific methods (legal analysis, process analysis).Results. In the process of analyzing advance notification practices in the EU and Japan, the key features of best practices in the organization of advance notification are identified and described.Conclusions. Recommendations for the development of advance notification in Russia are formulated: to increase the number of factors used to determine the content of advance information provided on a mandatory basis. An attempt is made to develop methodological recommendations for verifying information at the stage of advance notification.


Author(s):  
Arnold Adimabua Ojugo ◽  
Andrew Okonji Eboka

An effective systemic approach to task will lead to efficient communication and resource sharing within a network. This has become imperative as it aids alternative delivery. With communication properly etched into the fabrics of today’s society via effective integration of informatics and communication technology, the constant upgrades to existing network infrastructure are only a start to meeting with the ever-increasing challenges. There are various criteria responsible for network performance, scalability, and resilience. To ensure best practices, we analyze the network and select parameters required to improve performance irrespective of bottlenecks, potentials, and expansion capabilities of the network infrastructure. Study compute feats via Bayesian network design alongside upgrades implementation to result in a prototype design, capable of addressing users need(s). Thus, to ensure functionality, the experimental network uses known simulation kits such as riverbed modeler edition 17.5 and cisco packet tracer 6.0.1-to conduct standardized tests such as throughput test, application response-time test, and availability test.


T-Comm ◽  
2021 ◽  
Vol 15 (2) ◽  
pp. 40-45
Author(s):  
Vasiliy S. Elagin ◽  
◽  
Vladimir I. Fedorovskikh ◽  
Anastasia V. Spirkina ◽  
◽  
...  

The paper describes the main features of blockchain technology, provides the main areas of use of this technology. Today, blockchain has evolved into a reliable and secure way to store and record transactions across a wide range of application domains. However, the impact of existing solutions on the current network infrastructure needs to be considered. The authors propose to create a system for generating and storing blockchain traffic based on the JavaScript programming language. This solution cannot be applied to cryptocurrencies, but it allows you to evaluate the work of a distributed database based on blockchain technology. The aim of the work is to analyze the delays in the generation and distribution of traffic between various numbers of nodes and the dependence of the speed of distribution and block generation on the performance of computers. The paper also considered the algorithm for joining a new node to the cluster and sending a new block to the blockchain, as well as the scheme of a node in a blockchain cluster, and presented the results of an experiment with a quantitative assessment of network performance characteristics.


Author(s):  
Christopher J. Reid ◽  
Biswanath Samanta ◽  
Christopher Kadlec

The use of robots in complex tasks such as search and rescue operations is becoming more and more common. These robots often work independently with no cooperation with other robots or control software, and are very limited in their ability to perform dynamic tasks and interact with both humans and other robots. To this end, a system must be developed to facilitate the cooperation of heterogeneous robots to complete complex tasks. To model and study human-robot and robot-robot interactions in a multi-system environment, a robust network infrastructure must be implemented to support the broad nature of these studies. The work presented here details the creation of a cloud-based infrastructure designed to support the introduction and implementation of multiple heterogeneous robots to the environment utilizing the Robot Operating System (ROS). Implemented robots include both ground-based (e.g. Turtlebot) and air-based (e.g Parrot ARDrone2.0) systems. Additional hardware is also implemented, such as embedded vision systems, host computers to support virtual machines for software implementation, and machines with graphics processing units (GPUs) for additional computational resources. Control software for the robots is implemented in the system with complexities ranging from simple teleoperation to skeletal tracking and neural network simulators. A robust integration of multiple heterogeneous components, including both hardware and software, is achieved.


Author(s):  
A. S. Aksenov

This paper considers the issue of creating a software tool that provides the performing of the analysis of data received via various data transfer interfaces. The performing of the analysis helps to check the correctness of formation of the structure of informational and controlling messages of various components of a system under development, as well as the correctness of the network interaction and testing debugging and adjustment of software and hardware in terms of their information interaction at the level of information compatibility. A comparison with the existing network activity analysis tools is presented and several approaches to solving the issue of data analysis at the application level are compared. The article provides the validity of the choice of a unified format of srcML source data representation. Also it specifies the directions for further development of the analyzing program within present project solution. The expediency of the development of this software tool and the results of its application in the development of special‑purpose hardware and software suite are given in the conclusion.


Information ◽  
2019 ◽  
Vol 10 (3) ◽  
pp. 106 ◽  
Author(s):  
Pedro Manso ◽  
José Moura ◽  
Carlos Serrão

The current paper addresses relevant network security vulnerabilities introduced by network devices within the emerging paradigm of Internet of Things (IoT) as well as the urgent need to mitigate the negative effects of some types of Distributed Denial of Service (DDoS) attacks that try to explore those security weaknesses. We design and implement a Software-Defined Intrusion Detection System (IDS) that reactively impairs the attacks at its origin, ensuring the “normal operation” of the network infrastructure. Our proposal includes an IDS that automatically detects several DDoS attacks, and then as an attack is detected, it notifies a Software Defined Networking (SDN) controller. The current proposal also downloads some convenient traffic forwarding decisions from the SDN controller to network devices. The evaluation results suggest that our proposal timely detects several types of cyber-attacks based on DDoS, mitigates their negative impacts on the network performance, and ensures the correct data delivery of normal traffic. Our work sheds light on the programming relevance over an abstracted view of the network infrastructure to timely detect a Botnet exploitation, mitigate malicious traffic at its source, and protect benign traffic.


2019 ◽  
Vol 9 (1) ◽  
pp. 137
Author(s):  
Zhiyong Ye ◽  
Yuanchang Zhong ◽  
Yingying Wei

The workload of a data center has the characteristics of complexity and requirement variability. However, in reality, the attributes of network workloads are rarely used by resource schedulers. Failure to dynamically schedule network resources according to workload changes inevitably leads to the inability to achieve optimal throughput and performance when allocating network resources. Therefore, there is an urgent need to design a scheduling framework that can be workload-aware and allocate network resources on demand based on network I/O virtualization. However, in the current mainstream I/O virtualization methods, there is no way to provide workload-aware functions while meeting the performance requirements of virtual machines (VMs). Therefore, we propose a method that can dynamically sense the VM workload to allocate network resources on demand, and can ensure the scalability of the VM while improving the performance of the system. We combine the advantages of I/O para-virtualization and SR-IOV technology, and use a limited number of virtual functions (VFs) to ensure the performance of network-intensive VMs, thereby improving the overall network performance of the system. For non-network-intensive VMs, the scalability of the system is guaranteed by using para-virtualized Network Interface Cards (NICs) which are not limited in number. Furthermore, to be able to allocate the corresponding bandwidth according to the VM’s network workload, we hierarchically divide the VF’s network bandwidth, and dynamically switch between VF and para-virtualized NICs through the active backup strategy of Bonding Drive and ACPI Hotplug technology to ensure the dynamic allocation of VF. Experiments show that the allocation framework can effectively improve system network performance, in which the average request delay can be reduced by more than 26%, and the system bandwidth throughput rate can be improved by about 5%.


Sign in / Sign up

Export Citation Format

Share Document