The security level of networks virtual access is one of the key indexes to evaluate the IaaS capability in cloud computing. Due to the introduction of virtualization technology, the boundaries of physical security dom...
详细信息
ISBN:
(纸本)9780769548524
The security level of networks virtual access is one of the key indexes to evaluate the IaaS capability in cloud computing. Due to the introduction of virtualization technology, the boundaries of physical security domain have been broken and thus the traditional network access security and management strategies are not applicable any longer. Therefore, the security management of convergence between virtualization server and network has attracted more and more attention. In this paper, the challenges of networks virtual access are analyzed, and then referring to the study of standardization organizations, an overview of the existing technical solutions is presented from three aspects: the virtual security domains, traffic protection and traffic management. In addition, several related products and solutions of IT enterprises are introduced. At last, this paper argues there is still much improvement space for existing technology and product solutions.
One of the challenges in the design of a distributed multimedia system is to devise suitable specification models for various schemas in different levels of the system. Another important research issue is the integrat...
详细信息
ISBN:
(纸本)0819417645
One of the challenges in the design of a distributed multimedia system is to devise suitable specification models for various schemas in different levels of the system. Another important research issue is the integration and synchronization of heterogeneous multimedia objects. In this paper, we present our models for different multimedia schemas and transformation algorithms that transform high-level multimedia objects into schemas that can be used to support the presentation and communication of the multimedia objects.
Coming with the development of the wireless equipments, more applications can be transplanted onto mobile platform. So the transmission of multimedia in the wireless network enters our sight. In order to improve the e...
详细信息
ISBN:
(纸本)9781424421077
Coming with the development of the wireless equipments, more applications can be transplanted onto mobile platform. So the transmission of multimedia in the wireless network enters our sight. In order to improve the efficiency of system, we propose the p2p structure. For peers in the wireless network are less stable than normal, we use the mobile node ID instead of the static node ID in Kademlia and design a filter to choose the believable node for the first time. We also design the virtual channel caching mechanism and the motion estimated caching mechanism to guarantee the fluency of the multimedia transmission.
The concept of schedulable region previously introduced to broadband networks with quality of service guarantees is extended to multimedia devices such as audio/video processing and disk storage units. The resulting m...
详细信息
ISBN:
(纸本)0819417645
The concept of schedulable region previously introduced to broadband networks with quality of service guarantees is extended to multimedia devices such as audio/video processing and disk storage units. The resulting multimedia capacity region characterized the amount of resources a physical device is able to provide under quality of service constraints. The modeling methodology supports a straightforward association of resources with logical objects and, thereby, the mapping of logical objects onto physical objects with quality of service guarantees. Examples showing the size and shape of the multimedia capacity region of various physical devices are given.
In this paper, the fairness of QoS degradation for multi-class and multi-priority discrete adaptive multimedia applications is studied in wireless/mobile multimedia networks. The concept of degradation factor(DF) and ...
详细信息
ISBN:
(纸本)9781424413119
In this paper, the fairness of QoS degradation for multi-class and multi-priority discrete adaptive multimedia applications is studied in wireless/mobile multimedia networks. The concept of degradation factor(DF) and its definition are presented. Then, we propose a generalized proportional fair degradation principle minimizing the weighted sum of DF's square (MWSDFS). This principle considers not only inter-class and intra-class priority but also user's QoS degradation degree. At last, quantum genetic algorithm based solution is given for the problem, and the experimental results further validate the effectiveness of our proposed algorithm.
Planning for SuperJANET, a national high performance network to support UK research and higher education, commenced in 1989 and resulted in a four year project to deploy the network starting in March 1993. SuperJANET ...
详细信息
Planning for SuperJANET, a national high performance network to support UK research and higher education, commenced in 1989 and resulted in a four year project to deploy the network starting in March 1993. SuperJANET draws on the experience gained from its predecessor, the JANET network, but there are some major differences in the implementation strategy, technical aspects and applications. This paper describes the concepts behind the project, the plans for the network and the applications it will support.
Routing and resource allocation are two major research directions for cloud computing, especially for improving the response time in multimedia cloud computing. In this paper, we propose network model for the transmis...
详细信息
ISBN:
(纸本)9781631900259
Routing and resource allocation are two major research directions for cloud computing, especially for improving the response time in multimedia cloud computing. In this paper, we propose network model for the transmission time between data centers and design routing algorithms for multimedia cloud computing. We further propose resource allocation with the goal to minimize the resource cost. We show some first simulation results of our proposed algorithms.
A new method of classifying multimedia traffic flows was proposed for the Next Generation Internet(NGI). By analyzing the time level correlation of traffic flows, a model of Competitive Artificial Neural Network was d...
详细信息
ISBN:
(纸本)078039335X
A new method of classifying multimedia traffic flows was proposed for the Next Generation Internet(NGI). By analyzing the time level correlation of traffic flows, a model of Competitive Artificial Neural Network was designed to identify and classify different traffic flows and modulate them which can help to marking the Ipv6 Flow Label. Simulation result shows that the method can increase the precision of classification. and has little impact on the throughput of border gateway, has actual value.
Wireless multimedia Sensor Networks (WMSNs) are commonly used for communicating sensitive data which help in many important decision makings, so that it is crucial to ensure the received data are not manipulated in tr...
详细信息
ISBN:
(纸本)9781457720147
Wireless multimedia Sensor Networks (WMSNs) are commonly used for communicating sensitive data which help in many important decision makings, so that it is crucial to ensure the received data are not manipulated in transit and originated from the correct source. In the security perspective, however, the characteristics of WMSNs and the nature of multimedia make data authentication schemes more complex, especially for data integrity. In this regard, the aim of this paper is to investigate the feasibility of content-based authentication using image hashing technique as an alternative data authentication scheme in WMSNs. To assess the feasibility, the general requirements for image authentication in WMSNs are discussed in this paper. Additionally, the performance of five selected image hashing algorithms is measured with respect to robustness, sensitivity, and security. By comparing and analyzing the performance of the selected algorithms, this paper provides a perspective on the potential feasibility and limitations as an alternative to the traditional authentication scheme in WMSNs.
The increasing demand for multimedia content incur 58.6% of the Internet traffic during the peak period in North America [1] as of 2012. To better accommodate the demand, the computing power and networking components ...
详细信息
ISBN:
(纸本)9781479969593
The increasing demand for multimedia content incur 58.6% of the Internet traffic during the peak period in North America [1] as of 2012. To better accommodate the demand, the computing power and networking components in data centres are being upgraded regularly, leading to higher energy bills. Among many works on energy efficiency, very little attention has been paid in making multimedia streaming systems energy efficient. In this paper, we propose E-2 Stream, an energy-efficient multimedia streaming system. Unlike existing proposals, E-2 Stream utilizes resources in both the data-centre and end-user devices in order to reduce the power consumed by the entire streaming system. Our evaluation results, based on energy profiles from real devices, show that E-2 Stream can dynamically choose energy-efficient source to stream the content, which effectively reduces the energy consumptions among end-user devices and routers involved in the streaming session.
暂无评论