The past one and a half decades have seen great strides in the field of commercially available distributedcomputing implementations. The two most popular architectures in the modern world are Peer-to-Peer Systems and...
详细信息
The past one and a half decades have seen great strides in the field of commercially available distributedcomputing implementations. The two most popular architectures in the modern world are Peer-to-Peer Systems and Cloud Systems. Peer-to-Peer Systems (P2P) have become very popular in recent times, mainly being used to facilitate file sharing among disparate systems. Another recent trend in modern computing has been the wide scale utilization of Cloud computing architectures. These systems are used to allow multiple systems to pool their resources and allow other tertiary systems to use these shared resources in bulk for tasks such as data storage, complex calculations, and file sharing. This entails the conceptual outsourcing of various data processing tasks to an external cloud system. Given the two nearly independent functionalities of P2P and Cloud architectures, it is interesting to consider the possibility of fusing these two concepts and researching the applications of the resultant amalgamation. In this research paper, we discuss the theory and application of Cloud Based Peer-to-Peer Systems and their potential application in multimedia streaming services. While the value of P2P Systems and Cloud computing Systems have been extolled individually, the hybrid of both concepts shows great promise. In this paper we provide an introduction to Cloud computing Systems, P2P Systems, and the advantages as well as the limitations of both configurations. We then describe the concept of a Cloud-Based P2P System, its basic architecture, and its possible implementations. We also describe the possible application of a Cloud-Based P2P System as a platform for a multimedia streaming service. A proposed algorithm to facilitate streaming in such an application is also described, along with a proposed system model and its advantages. (C) 2015 The Authors. Published by Elsevier B.V.
In this paper, we propose a method using skip graphs to delivery sensor data streams with heterogeneous delivery cycles. Currently skip graphs have been proposed as one of structured overlay networks that construct li...
详细信息
ISBN:
(纸本)9781467394734
In this paper, we propose a method using skip graphs to delivery sensor data streams with heterogeneous delivery cycles. Currently skip graphs have been proposed as one of structured overlay networks that construct links among nodes based on a specific rule. The proposed method sorts nodes by their delivery cycles and constructs delivery paths based on skip graphs. We confirmed in simulation that our proposed method can delivery sensor data with heterogeneous cycles using skip graphs to distribute the load of source node.
In this paper we explore how future smart environments can be given a sense of humor. Humor requires smartness. Entering witty remarks in a conversation requires understanding of the conversation, the conversational p...
详细信息
ISBN:
(纸本)9783319208046;9783319208039
In this paper we explore how future smart environments can be given a sense of humor. Humor requires smartness. Entering witty remarks in a conversation requires understanding of the conversation, the conversational partner, the context and the history of the conversation. We can try to model interaction smartness and how to use it in creating not only witty remarks, but also to create humorous events. Smart sensors and actuators, embedded in our environments and our wearables allow us to make changes to a digitally enhanced physical environment. Witty remarks in language can have their counterpart in witty events in digital environments, including social media environments with their own communication characteristics. Sequential and parallel juxtapositions of incongruous and contrasting events invade our communication and, in addition, can be expected to emerge or to be created in digitally enhanced physical environments too, accidentally and intentionally.
With the rise of cloud computing, cloud storage has become a challenging issue. It is a huge challenge to design a distributed file architecture to meet the requirements of cloud storage. In this paper, in order to im...
详细信息
ISBN:
(纸本)9783319089911;9783319089904
With the rise of cloud computing, cloud storage has become a challenging issue. It is a huge challenge to design a distributed file architecture to meet the requirements of cloud storage. In this paper, in order to improve the system reliability and performance, we propose a cloud storage architecture with a meta-data service layer. The proposed architecture is a distributed file storage system based on the master-slave architecture, which uses multiple proxy servers of the meta-data server to establish a peer-to-peer meta-data service layer. Each meta-data server and the proxy server, could be an access to service for clients rather than only one fixed access as usual, which can improve the parallel processing performance of a meta-data service layer greatly. Some P2P techniques are used between proxy servers to solve the disadvantages of the master-slave architecture efficiently. Analysis and evaluation are performed to demonstrate that the proposed architecture improves the system reliability and performance greatly.
The next-generation network, cloud computing, and internet of thing are a challenging and promising paradigm shift in IT world technology. Diminishing the cost for users for provisioning anywhere connecting at anytime...
详细信息
We propose an algorithm that builds a hierarchical clustering in a network, in the presence of topological changes. Clusters are built and maintained by random walks, that collect and dispatch information to ensure th...
详细信息
ISBN:
(数字)9783319179964
ISBN:
(纸本)9783319179964;9783319179957
We propose an algorithm that builds a hierarchical clustering in a network, in the presence of topological changes. Clusters are built and maintained by random walks, that collect and dispatch information to ensure the consistency of clusters. We implement distributed communication primitives allowing clusters to emulate nodes of an overlay distributed system. Each cluster behaves like a virtual node, and executes the upper level algorithm. Those primitives ensure that messages sent by a cluster are received and treated atomically only once by their recipient, even in the presence of topological changes. Decisions concerning the behavior of the cluster (virtual node for the higher level algorithm) are taken by the node that owns the random walk at this time. Based on this abstraction layer and the overlay network it defines, we present a distributed hierarchical clustering algorithm, aimed at clustering large-scale dynamic networks.
With the advancement of information technology and the wide adoption of the internet, cloud computing has become one of the choices for researchers to develop their applications. Cloud computing has many advantages, p...
详细信息
ISBN:
(纸本)9783662467428;9783662467411
With the advancement of information technology and the wide adoption of the internet, cloud computing has become one of the choices for researchers to develop their applications. Cloud computing has many advantages, particularly the ability to allocate on-demand resources without the need to build a specialized infrastructure or perform major maintenance. However, one of the problems faced by the researcher is the availability of computer tools to perform research. Docker is a lightweight virtualization for developers that can be used to build, ship, and run a range of distributed applications. This paper describes how Docker is deployed within a platform for bioinformatics computing.
The task of making the spectrum of home network connections visible in its entirety and details is a necessary first step towards a renewed understanding of home and domestic life as well as of the technical systems t...
详细信息
ISBN:
(纸本)9783319208046;9783319208039
The task of making the spectrum of home network connections visible in its entirety and details is a necessary first step towards a renewed understanding of home and domestic life as well as of the technical systems that underpin it. This paper proposes the categorization of pervasive interactions that take place in contemporary living spaces through certain criteria and tries to map them into the predefined spaces of today's home, by creating a basic visualization tool. The research concludes with an example of a "composite map" that shows all the interlinked interactions that take place in a contemporary home. This map can become a potential tool for further research in the fields of the structure, behaviour and countenance of home networks, of advances in intimate media, applications and networked devices, and of augmented architectural spaces that interact with complex and pervasive communication networks.
Advanced computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world ...
ISBN:
(纸本)9788132225287
Advanced computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Thirdinternationalconference on Advanced computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 2325, 2015.
Advanced computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world ...
ISBN:
(纸本)9788132225379
Advanced computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Thirdinternationalconference on Advanced computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 2325, 2015.
暂无评论