seamless service
Recently Published Documents


TOTAL DOCUMENTS

105
(FIVE YEARS 8)

H-INDEX

11
(FIVE YEARS 1)

Author(s):  
Muhammad Rizwan Anwar ◽  
Shangguang Wang ◽  
Muhammad Faisal Akram ◽  
Salman Raza ◽  
Shahid Mahmood

2020 ◽  
Vol 7 (9) ◽  
pp. 9040-9049
Author(s):  
Jinliang Xu ◽  
Xiao Ma ◽  
Ao Zhou ◽  
Qiang Duan ◽  
Shangguang Wang

Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4621
Author(s):  
Thanh-Tung Nguyen ◽  
Yu-Jin Yeom ◽  
Taehong Kim ◽  
Dae-Heon Park ◽  
Sehan Kim

Kubernetes, an open-source container orchestration platform, enables high availability and scalability through diverse autoscaling mechanisms such as Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler and Cluster Autoscaler. Amongst them, HPA helps provide seamless service by dynamically scaling up and down the number of resource units, called pods, without having to restart the whole system. Kubernetes monitors default Resource Metrics including CPU and memory usage of host machines and their pods. On the other hand, Custom Metrics, provided by external software such as Prometheus, are customizable to monitor a wide collection of metrics. In this paper, we investigate HPA through diverse experiments to provide critical knowledge on its operational behaviors. We also discuss the essential difference between Kubernetes Resource Metrics (KRM) and Prometheus Custom Metrics (PCM) and how they affect HPA’s performance. Lastly, we provide deeper insights and lessons on how to optimize the performance of HPA for researchers, developers, and system administrators working with Kubernetes in the future.


2020 ◽  
Vol 7 (2) ◽  
pp. 146-150
Author(s):  
Bruce Dahlman
Keyword(s):  

A call to bring together healthcare and mission endeavors in a seamless service using Jesus' life and ministry as a model. 


10.29007/8jkt ◽  
2019 ◽  
Author(s):  
Stefan Stanzel

The German Air Navigation Service Provider (ANSP) DFS Deutsche Flugsicherung (DFS) is operating a surveillance infrastructure mainly based on radars and multilateration systems, which provides surveillance information and receives aircraft derived data. The implementation and use of the new surveillance technology Automatic Dependent Surveillance – Broadcast (ADS-B) has to provide benefits in terms of safety, performance or costs. DFS operations require a permanent double surveillance coverage for the area of responsibility. This requirement actually means triple surveillance coverage (in order to provide a seamless service also in case of system outages or planned down times). DFS is implementing ADS-B as the third surveillance layer to reduce costs. Each surveillance layer has to fulfil the performance and safety requirements independently. The fulfilment of safety requirements, integrity and continuity, will require validation of the passively received ADS-B information.Data integrity and continuity need to be considered w.r.t. safety requirements, but may also have to address security. The integrity of ADS-B data can be ensured either by comparison with data from other surveillance sensors (dependent validation) or by analyzing the properties of the data itself (independent validation). The independent validation of the ADS-B data is a necessary prerequisite for providing a self-contained independent surveillance layer using the ADS-B technology. In a first step, DFS will implement ADS-B as a dependent layer: (1) for validation of the assumption on surveillance performance, (2) to gain experience on data integrity and data continuity, (3) to prepare possible mitigations e.g. against spoofing or jamming and (4) to recognize potential shortcomings in the airborne installations and identify possible mitigations. This first step will support necessary developments (e.g. ADS-B Validation Unit) to move with ADS-B towards the use as an independent surveillance layer reducing infrastructure costs and improve radio spectrum protection.


Author(s):  
S.B. Kumbalavati ◽  
J.D. Mallapur

Background & Objective: Vertical handover is an inevitable operation demanded in the heterogeneous network to offer consistent connectivity to the user's device during migration from home to a foreign network. Existing literature still shows that there is a large scope for addressing the problem associated with providing seamless service if the latency issue associated with authentication is emphasized. Therefore, the proposed system introduces a very simplified architecture that acts as an external agent for collaborating with various forms of network devices that could exist in the heterogeneous network. Methods: An algorithm is formulated that offers significantly faster authentication mechanism by considering two important attributes, i.e., latency and duration. Without using any form of complex cryptography, this proposed system proved that its architecture could successfully minimize significant delay along with proper retention of throughput. Results and Conclusion: The study outcome has exhibited a computationally efficient vertical handover approach in contrast to the existing system.


2017 ◽  
Vol 8 (4) ◽  
pp. 42-53
Author(s):  
Markus Häyhtiö ◽  
Klaus Zaerens

Abstract International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain.


Sign in / Sign up

Export Citation Format

Share Document