Computer network application, as the key point of IT innovation and reform, provides a virtualized platform based on the internet of the computer hardware platform, which allows the orderliness of the data transmissio...
详细信息
Checkpointing is a fault-tolerance mechanism commonly used in High Throughput computing (HTC) environments to allow the execution of long-running computational tasks on compute resources subject to hardware and softwa...
详细信息
ISBN:
(纸本)9789897580253
Checkpointing is a fault-tolerance mechanism commonly used in High Throughput computing (HTC) environments to allow the execution of long-running computational tasks on compute resources subject to hardware and software failures and interruptions from resource owners. With increasing scrutiny of the energy consumption of IT infrastructures, it is important to understand the impact of checkpointing on the energy consumption of HTC environments. In this paper we demonstrate through trace-driven simulation on real-world datasets that existing checkpointing strategies are inadequate at maintaining an acceptable level of energy consumption whilst reducing the makespan of tasks. Furthermore, we identify factors important in deciding whether to employ checkpointing within an HTC environment, and propose novel strategies to curtail the energy consumption of checkpointing approaches.
The modern distributed systems have not only functional requirements (i.e. absence of deadlock, livelock etc.) but also have non-functional requirements (i.e. security, reliability, performance, Quality of Service(QoS...
详细信息
ISBN:
(纸本)9781479970025
The modern distributed systems have not only functional requirements (i.e. absence of deadlock, livelock etc.) but also have non-functional requirements (i.e. security, reliability, performance, Quality of Service(QoS) etc.). The methods for checking their correctness and analyze their performance is at very primitive stage. In the last few decades, formal verification techniques such as process algebras offer a powerful and rigorous approach for establishing the correctness of computer systems. The classical process algebras were concerned with the functional aspects of the concurrent systems. Stochastic extension of process algebras is developed to add quantification to process algebra models. In this paper, we present a comprehensive survey on different stochastic process algebras to find the recent trends of development and limitations of the various developments of stochastic process algebras. We also discuss state space explosion problem which is the major problem in classical stochastic process algebras and different approaches described by the different authors to tackle with the state space explosion. Finally we suggest the possibility to use, one of the methods to tackle state space explosion problem called fluid flow approximation, along with stochastic process algebras to model and do performance analysis of routing calculi, which are extensions of distributed calculi. These routing calculi are developed to model a distributed network with the intention to demonstrate the cost of communication between the communicating processes.
A distributed Denial of Service (DDOS) attack can make huge damages to resources and access of the resources to genuine users. Offered defending system cannot be easily applied in cloud computing due to their relative...
详细信息
ISBN:
(纸本)9781479930807
A distributed Denial of Service (DDOS) attack can make huge damages to resources and access of the resources to genuine users. Offered defending system cannot be easily applied in cloud computing due to their relatively low competence and wide storage. In this work we presented statistical technique to detect and filter DDOS attacks. The proposed model requires small storage and ability of fast detection. The obtained results show that our model has the ability to mitigate most of TCP attacks. Detection accuracy and Time consumption were the metrics used to evaluate the performance of our proposed model. From the simulation results, it is visible our algorithms achieve high detection accuracy (97%) with fewer false alarms.
In this work an optimized approach of power control during soft handoff in downlink direction of WCDMA systems is proposed which is based on unbalanced power control scheme in which in the downlink direction all base ...
详细信息
ISBN:
(纸本)9781479976836
In this work an optimized approach of power control during soft handoff in downlink direction of WCDMA systems is proposed which is based on unbalanced power control scheme in which in the downlink direction all base stations in the active set transmit with different power to the MS based on the level of attenuation to the MS. Compared to balanced and unbalanced power control schemes adopted by 3rd Generation Partnership Program (3GPP) in downlink direction proposed power control scheme during soft handoff reduces the additional interference caused by multiple site transmission and minimizes the overall transmitted power, thus increases the downlink capacity but compromises in the macro-diversity gain due to soft handoff. The proposed scheme is particularly suitable in the environments which face poor propagation attenuation.
Cloud computing is an emerging distributedcomputing model consisting of massive datacenters for making different services available to the users. In the current scenario where energy consumption and wastage in the IT...
详细信息
ISBN:
(纸本)9781479970025
Cloud computing is an emerging distributedcomputing model consisting of massive datacenters for making different services available to the users. In the current scenario where energy consumption and wastage in the IT field is looked upon with growing apprehension, Green computing encourages the design of energy efficient computing approaches that can be applied to cloud computing to address and reduce the factors which influence power consumption alias energy cost. Other evolving technologies like Virtualization and VM (Virtual Machine) migration technologies are employed widely for energy efficient consolidation of resources. The existing work on green cloud service provisioning aids energy aware cloud service provisioning by incorporating the Trigger Engine Agent which uses the static pre-processed information of service usage to initiate live VM migration. This paper proposes to take the dynamic environment into consideration to substantiate the decisions made by the existing model and incorporate learning agents into the model. Our model comprises of two parts: a dynamic Post-Processing Agent and a Learning Agent. The Post-Processing Agent verifies the migration decisions made by the Trigger Engine and corrects them if they do not conform to the energy-aware provisioning approach. The significant portion of this work is the Learning Agent, which will learn the optimal policy to follow in the current environment by incorporating the actions of the Post-Processing agent into the preprocessed data of the existing system using Q-learning methodology.
Disaster recovery planning and securing business processes against outtakes have been essential parts of running a company for decades. As IT systems became more important, and especially since more and more revenue i...
详细信息
ISBN:
(纸本)9783662448793;9783662448786
Disaster recovery planning and securing business processes against outtakes have been essential parts of running a company for decades. As IT systems became more important, and especially since more and more revenue is generated over the internet, securing the IT systems that support the business processes against outages is essential. Using fully operational standby sites with periodically updated standby systems is a well-known approach to prepare against disasters. Setting up and maintaining a second datacenter is, however, expensive. In this work, we present Cloud Standby, a warm standby approach for setting up and updating a standby system in the Cloud. We describe the architecture of Cloud Standby and its methods for deploying and updating the standby system. We show that by using Cloud Standby the recovery time and long-term costs of disaster recovery can significantly be reduced.
In this paper, we consider the joint scheduling, routing and congestion control mechanism in [4] while incorporating a comprehensive physical layer model that considers both primary half-duplex constraints and the pow...
详细信息
With the development of cloud computing and internet and the wide combination of them, internet mobile internet security issues under the cloud computing mode become more and more significant. Compared with the tradit...
详细信息
ISBN:
(纸本)9783662439081;9783662439074
With the development of cloud computing and internet and the wide combination of them, internet mobile internet security issues under the cloud computing mode become more and more significant. Compared with the traditional internet security problems, the new one could cause much more serious destructions, so it is necessary to pull out the mobile internet security risk evaluation method based cloud computing mode as soon as possible. This passage has analyzed deeply of the technological characteristics, service's modes and new appeared security issues of mobile internet under the cloud computing mode. Combined with current information security risk evaluation methods, the passage also provides new mobile internet security risk evaluate method. This method includes assets identification, threat identification, fragility identification, existed security measures confirmation and risk computing.
Given a set of n sensor nodes distributed randomly over a 2 D plane, this paper addresses the problem of computing the area covered by the sensors assuming that each sensor covers a circular area of radius r. To make ...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
Given a set of n sensor nodes distributed randomly over a 2 D plane, this paper addresses the problem of computing the area covered by the sensors assuming that each sensor covers a circular area of radius r. To make the computation simple, instead of considering real circles, a digital geometry based approach is followed here. A detailed study on intersection of digital circles reveals many interesting properties that lead to the development of a novel O(n log n) centralized algorithm using simple arithmetic operations for computing the area covered by n uniform digital circles. Next, a distributed version of the same is proposed to select a subset of nodes to cover a given area. Comparison with earlier works by simulation shows that the proposed distributed algorithm improves the estimated area coverage significantly.
暂无评论