Edge computing will likely be of significant import to the Smart City context, providing a means to deploy and manage large distributed applications [5] [3]. Although Edge computing is receiving significant attention ...
详细信息
ISBN:
(纸本)9781728103594
Edge computing will likely be of significant import to the Smart City context, providing a means to deploy and manage large distributed applications [5] [3]. Although Edge computing is receiving significant attention at present, many issues relating to this paradigm remain unclear. In this paper, we focus specifically on mechanisms required to extend Data Centre networking technologies to edge devices. More specifically, we describe the solution we have developed which enables Open Virtual networking (OVN) to be extended to the edge to support integration with a docker engine located at the edge of the network. the mechanisms consist of a process by which a docker engine can request to join the network, an approval process which leverages Openstack authentication and access control mechanisms, a mechanism by which the remote system can connect to the OVN and finally containers can be initialized on the remote docker engine and interact with entities operating in the Enterprise Data Centre.
To facilitate the mobile users on ships for communication effectively in the offshore areas at sea, this paper proposes an integrated wireless networking system that is composed of mobile ad hoc network, cellular mobi...
详细信息
the justification, design, and performance of the Stealthdistributed Scheduler is discussed. the goal of Stealth is to exploit the unused computing capacity of a workstation-based distributed system (WDS) without und...
详细信息
ISBN:
(纸本)0818621443
the justification, design, and performance of the Stealthdistributed Scheduler is discussed. the goal of Stealth is to exploit the unused computing capacity of a workstation-based distributed system (WDS) without undermining the predictability in quality of service that a WDS provides to workstation owners. It is shown that the liberal approach taken by the Stealthdistributed Scheduler is a promising method of exploiting the vast quantity of unused computing capacity typically present in a WDS, while preserving predictability of service for workstation owners.
Currently, most of cloud computing services based on IaaS are provided by one specific provider for many users. However, this has some problems in terms of initial cost or ISP transit cost. In addition, individual sma...
详细信息
ISBN:
(纸本)9781479923557
Currently, most of cloud computing services based on IaaS are provided by one specific provider for many users. However, this has some problems in terms of initial cost or ISP transit cost. In addition, individual small use is difficult because the services tend to be provided in a large unit to use. To solve these problems, we advocate a "participating cloud computing platform" that personal or small company level resource suppliers participate in, configure and provide cloud computing. then, to efficiently search nearby resources among many and various ones in the platform, we propose Resource Breadcrumbs (RBC) as a key technology to provide in-network guidance capability for users' requests. this enables to supply users a smaller unit of resources: computing resource, memory resource, content, application etc. in comparison to traditional IaaS service. In the proposal, supplier-nodes distribute, around them, guidance information directed to themselves with dedicated control message. the distributed information enables user to autonomously locate nearby resources. In addition, distributed management reduces computational load on central database and enables to build cloud platform with lower cost.
this paper Presents a distributed Grid-Density based Satellite data Clustering technique, DisClus(1), which can detect clusters of arbitrary shapes and sizes over high resolution, multi-spectral satellite datasets. Qu...
详细信息
ISBN:
(纸本)9783642113215
this paper Presents a distributed Grid-Density based Satellite data Clustering technique, DisClus(1), which can detect clusters of arbitrary shapes and sizes over high resolution, multi-spectral satellite datasets. Quality of the clusters is further enhanced by incorporating a partitioning based method for the reassignment of the border pixels to the most relevant;clusters. Experimental results are presented to establish the superiority of the technique in terms of scale-up, speedup as well as cluster quality.
Withthe introduction of novel standardized web technologies such as WebGL, 3D virtual environments (VEs) are making their way into the web. Concurrently, resource rich mobile devices, such as smartphones and tablets,...
详细信息
ISBN:
(纸本)9781467377010
Withthe introduction of novel standardized web technologies such as WebGL, 3D virtual environments (VEs) are making their way into the web. Concurrently, resource rich mobile devices, such as smartphones and tablets, have become the primary access medium for the web. this paper introduces a method called RADE that enables resource-aware P2P-assisted 3D asset delivery in a web browser using WebRTC. Use of P2P technology in 3D asset delivery can (1) decrease the load on 3D asset servers;(2) decrease the application response times;and (3) reduce the operational costs of VE service providers. the performance and resource fairness of RADE was evaluated in real-life wireless networks using a prototype implementation. Based on the results, RADE can significantly reduce the server load and the 3D asset delivery times especially when 3D asset servers are under heavy load. For instance, with a scarce server bandwidth of 2Mbps, use of RADE resulted in 55% shorter 3D asset delivery times on average. Although RADE has been developed for 3D asset delivery, it is applicable for many types of web applications, including video delivery.
Next-generation computation-intensive applications in various science and engineering fields feature large-scale computing workflows. Supporting such computing workflows and optimizing their network performance in ter...
详细信息
ISBN:
(纸本)9783642113215
Next-generation computation-intensive applications in various science and engineering fields feature large-scale computing workflows. Supporting such computing workflows and optimizing their network performance in terms of end-to-end delay or frame rate in heterogeneous network environments are critical to the success of these distributed applications that require fast response time or smooth data flow. We formulate six linear pipeline configuration problems with different mapping objectives and network constraints, and one general workflow mapping problem. We investigate the computational complexity of these problems and design optimal or heuristic algorithms with rigorous correctness proof and performance analysis. An extensive set of optimization experiments on a large number of simulated workflows and networks illustrate the superior performance of the proposed algorithms in comparison withthat of existing methods.
As enterprise computing transforms to accommodate network centric (net-centric) systems and services, comprehensive monitoring capabilities for Service Oriented Architecture (SOA)-based applications are critical in or...
详细信息
ISBN:
(纸本)9780769528915
As enterprise computing transforms to accommodate network centric (net-centric) systems and services, comprehensive monitoring capabilities for Service Oriented Architecture (SOA)-based applications are critical in order to unite business requirements with emerging technologies. these capabilities enable network operators and service providers to observe and proactively respond to events that occur during deployment and operation of enterprise computing systems. this paper presents a novel approach for SOA monitoring applied to these systems. Metrics for SOA monitoring are presented along with an SOA monitoring framework and reference monitoring architecture. Examples are provided to demonstrate the usefulness of this architecture for enterprise computing systems.
the purpose of distributed generation in improving voltage profile, abating losses, slashing fuel cost and boosting efficiency is becoming important in modern power system operation. this paper summarizes an unconvent...
详细信息
Software realization of distributedcomputing systems is typically achieved through the component-based software development approach. thus, software executing on such distributed systems consists of many autonomous c...
详细信息
ISBN:
(纸本)9780769528915
Software realization of distributedcomputing systems is typically achieved through the component-based software development approach. thus, software executing on such distributed systems consists of many autonomous components which interact with each other to coordinate their activities. the need for such coordination along with requirements such as heterogeneity, scalability, security, and availability, considerably;increases the complexity of code in distributed systems. Simplifying distributed component-based software development requires abstractions at various levels that enable separate design and specification of component interactions and the components themselves. this paper depicts a method to specify component interactions involving temporal invocation constraints. Based on the knowledge of component interactions, two types of replaceability criteria are defined and empirically evaluated.
暂无评论