This paper presents a novel distributed probe system to measure the performance of the network in the cloud service system. Specifically, a three-layer architecture is designed to support a large number of network pro...
详细信息
ISBN:
(纸本)9781479947195
This paper presents a novel distributed probe system to measure the performance of the network in the cloud service system. Specifically, a three-layer architecture is designed to support a large number of network probes. Furthermore, the probes, which are used to implement the measurements across networks, have negligible influence on the entire network. Compared with the existing methods, our approach is more flexible and adaptable to the large-scale network. Our method can be adapted to the network in various kinds of cloud service systems, including private, public and hybrid ones. Moreover, the performance data will be returned in real time. By utilizing a statistical algorithm to analyze the data, our system will give the Cloud Service Administrator (CSA) a better and deeper evaluation of the situation of the network in the cloud service system. Experimental results demonstrate that our system is efficient and practical.
In recent years scientific computing has evolved into a massive usage of cloud computing, due to its flexibility in managing computing resources. In this paper, we focus on genomic data processing, which is rapidly ga...
详细信息
ISBN:
(纸本)9781479927302
In recent years scientific computing has evolved into a massive usage of cloud computing, due to its flexibility in managing computing resources. In this paper, we focus on genomic data processing, which is rapidly gaining momentum in research and medical activities. The main characteristics of these data sets is that not only the number of available genome files is becoming extremely large, but also each individual data set is significantly large, in the order of tens of GB. Hence, a wide diffusion of cloud-based genomic data processing will have a significant impact on network resources, since each processing request will require the transfer of tens of GBs into computing nodes. To face this issue, in this paper we propose a resource discovery framework which provides decision agents with the needed information for selecting the most suitable computing nodes. We have implemented this resource discovery function in a distributed fashion, and extensively tested it in a lab testbed consisting of about 70 nodes. We found that the overhead of the proposed solution is negligible in comparison with the amount of transferred data.
Domain Name System is a component of the internet Infrastructure shortly referred as DNS. DNS provides simple service for lookup and translation of URL into IP addresses and IP addresses into URL. However, due to the ...
详细信息
ISBN:
(纸本)9781479970025
Domain Name System is a component of the internet Infrastructure shortly referred as DNS. DNS provides simple service for lookup and translation of URL into IP addresses and IP addresses into URL. However, due to the enormous scale of the internet, the DNS also has grown tremendously, leading to security concerns stability and reliability. Cloud computing with its superior features of availability and reliability has emerged as the defacto infrastructure for DNS solutions Thereby enabling to provide DNS as a service. This paper is aimed at iterating the impact of cloud on DNS and its Security. It also discusses several advantages of cloud that make it a best choice for DNS. It also discusses about the current solutions being offered with DNS as a Service.
While originating as an instant messaging infrastructure, the eXtensible Messaging and Presence Protocol (XMPP) has its applications as a lightweight middleware for real-time event distribution, e.g. for mobile comput...
详细信息
ISBN:
(纸本)9781479950607
While originating as an instant messaging infrastructure, the eXtensible Messaging and Presence Protocol (XMPP) has its applications as a lightweight middleware for real-time event distribution, e.g. for mobile computing or the internet of Things. Services based on XMPP are traditionally realized as server components with simple local registration for discovery, which is not appropriate for distributed mobile services. We present an alternative approach for distributed hosting of XMPP services, which may also be suitable for distributed mobile services. Both cases have in common that service hosting nodes may be added to and removed from the overall system at any time. Furthermore, both share the necessary access control of registration on the discovery node. The solution only uses standardized XMPP features and extensions like roster items, roster groups, entity capabilities, and in-band registration. The evaluation shows how concrete service instances can be efficiently distributed on different XMPP-enabled cloud servers.
Cloud storage, data storage means occurring in recent years is based on cloud computingtechnology. It is the inevitable trend of data storage in the future. The article describes the definition and characteristics of...
详细信息
ISBN:
(纸本)9783037859100
Cloud storage, data storage means occurring in recent years is based on cloud computingtechnology. It is the inevitable trend of data storage in the future. The article describes the definition and characteristics of cloud computing and design a generic cloud computing architecture, given its storage technology for cloud computing, cloud storage system architecture model. At last, the paper prospects the tendency of cloud computing and its storage technology.
It is believed that effective communications are important to a successful response to emergency situations. Especially, when a terrorist attack happens, the ability to share multimedia information promptly and direct...
详细信息
ISBN:
(纸本)9781479947195
It is believed that effective communications are important to a successful response to emergency situations. Especially, when a terrorist attack happens, the ability to share multimedia information promptly and directly affects the ability to fight terrorists and save lives. In this paper, a novel network which is based on TD-LTE is designed for counter-terrorism emergency communication in urban area. With the description of the architecture of the TD-LTE CECN, this paper mainly focuses on the process of accessing to the network. Besides, an example of data flow is provided as well as a simulation to prove the performance of this network. At the end of this paper, a political mechanism is discussed to fight terrorists effectively.
As a new computing model cloud computing provide users with services subversive with the aid of the vast resources on the internet system. Cloud computing has been used in network storage, web search, e-mail applicati...
详细信息
ISBN:
(纸本)9781479947195
As a new computing model cloud computing provide users with services subversive with the aid of the vast resources on the internet system. Cloud computing has been used in network storage, web search, e-mail application and other fields. In order to achieve the fairness of data distribution and improve the throughout and transmission rate, the cloud computing model based on multiservice access dynamic detection was researched. First, the fundamental of cloud computing is analysis. Second, the current average dynamic change date based on the date geometry window variable is proposed, and then the dynamic date distribution algorithm is deduced based on current average dynamic change geometry window variable. Finally, combined the multiservice assess, the cloud computing model is obtained based on the dynamic date detection algorithm.
In order to detect internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution...
详细信息
ISBN:
(纸本)9783038352679
In order to detect internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities.
The paper present a framework for video playing and video storage based on Hadoop. Our framework consist of 3 layers. CDN for receiving clinets39; requests;CCN for connecting clients and sending data;Hadoop cluster ...
详细信息
ISBN:
(纸本)9781479947195
The paper present a framework for video playing and video storage based on Hadoop. Our framework consist of 3 layers. CDN for receiving clinets' requests;CCN for connecting clients and sending data;Hadoop cluster for data storage. This kind of structure helps to provide high availablility services, which could support high concurrent access and play smooth streaming media in mobile terminals.
According to the present situation of the industrial resources of internet of Things(IOT) are distributed in unbalance in different provinces, in this paper, using principal component analysis, it has ranked the compe...
详细信息
ISBN:
(纸本)9783037859162
According to the present situation of the industrial resources of internet of Things(IOT) are distributed in unbalance in different provinces, in this paper, using principal component analysis, it has ranked the competency of the industrial development of internet of Things in 31 provinces;On the basis of the result, analyzing the top five provinces, the factors that restrict the industrial development of internet of Things, we find the competitive advantage of the internet of Things industry is concentrated in key points, which include the number of developing projects in new products' high technology and the number of regional patent authorizations, providing the basis for the internet of Things industry to develop system layout and competitive strategy.
暂无评论