As cloud-based services become more numerous and dynamic, service providers have to address the problem on how to allocate the cloud resources to their services. Only by solving this problem can they enjoy the high ef...
详细信息
As one of the three service models of cloud computing, PaaS (Platform as a Service) has gained more and more popularity for its capabilities in optimizing development productivity and business agility. However, the tr...
详细信息
Recent work has shown that Proxy Mobile IPv6 (PMIPv6) is a promising mobility management protocol for its salient features, such as supporting unmodified Mobile Node (MN). However, PMIPv6 does not consider the multica...
详细信息
Recent work has shown that Proxy Mobile IPv6 (PMIPv6) is a promising mobility management protocol for its salient features, such as supporting unmodified Mobile Node (MN). However, PMIPv6 does not consider the multicast routing support. Moreover, current research mainly concerns on the multicast receiver mobility, but it is a critical and challenging issue to ensure service connectivity for mobile multicast senders, which has not been addressed well. In this paper, we propose an efficient multicast sender mobility scheme for PMIPv6 (PMIP-BT), in which the multicast data can be transmitted through the PMIPv6 tunnel and the multicast sender mobility is transparently enabled in the PMIPv6 networks. Numerical results show that the proposed scheme outperforms the current scheme in terms of signaling cost.
As a promising technology, Network Virtualization plays a vital role in Cloud Computing and Data Center Networks by allowing multiple heterogeneous virtual networks to run simultaneously on a shared substrate network....
详细信息
ISBN:
(纸本)9781849198196
As a promising technology, Network Virtualization plays a vital role in Cloud Computing and Data Center Networks by allowing multiple heterogeneous virtual networks to run simultaneously on a shared substrate network. A fundamental challenge in Network Virtualization is the Virtual Network Embedding (VNE) problem: how to effectively embed various virtual networks onto shared physical nodes and links in the substrate network. Previous research presents many heuristic algorithms, but barely considers topological attributes of substrate and virtual networks, which may lead to decreased utilization of substrate resources. In this paper, we advocate utilizing topological attributes of substrate and virtual networks in the VNE problem, and propose a topology-aware VNE algorithm based on the degrees of nodes. Due to overall consideration of substrate and virtual networks, our study better coordinates node and link embedding. Extensive simulations demonstrate that our proposed algorithm significantly improves the long-term average revenue, acceptance ratio, and revenue/cost ratio compared to previous algorithms.
As cloud-based services become more numerous and dynamic, service deployment becomes more and more challenging. For the reason of economic, the service deployment strategy is crucial for maximize the system utility an...
详细信息
Software-Defined networking (SDN) is an innovative and programmable networking architecture, representing the direction of the future network evolution. In this paper, we propose an architecture to introduce traffic c...
详细信息
Software-Defined networking (SDN) is an innovative and programmable networking architecture, representing the direction of the future network evolution. In this paper, we propose an architecture to introduce traffic classification techniques into the OpenFlow-based SDN network, which enables the network to be application-aware, so the network could distinguish various applications flows and know the requirements of different flows. Our new architecture also take advantage of the new intelligence to make the network forward traffic flows based flows' demands on bandwidth and delay, which could improve Quality of Service (QoS) of applications and optimize resource allocation all over the network.
Due to inevitable cross-layer conflict existing in route objectives of overlay routing and traffic engineering, the interaction between two selfish players causes network oscillations and routing performance loss. The...
详细信息
ISBN:
(纸本)9781849198196
Due to inevitable cross-layer conflict existing in route objectives of overlay routing and traffic engineering, the interaction between two selfish players causes network oscillations and routing performance loss. The interaction is investigated as a Nash routing game with best-reply, where two players have equal status, and take turn to optimize their routes. Overlay routing aims to minimize the total latency of all the overlay paths, while traffic engineering aims to minimize the maximum link utilization of the native network. We propose two simple, yet efficient strategies for overlay and native layers. The simulation results under various network conditions show that these two strategies help the interaction converge to an acceptable stable state in a short time and increase the stability of the whole network.
With the explosive growth of web services, the research on how to rapidly find the desired services becomes increasingly important and challenging. In this paper, we focus on non-semantic web services discovery and pr...
详细信息
A shortest distance computing algorithm was proposed to protect the edge weight privacy based on homomorphic encryption. The algorithm encrypted the edge weight information and outsourced the encrypted data into cloud...
详细信息
A shortest distance computing algorithm was proposed to protect the edge weight privacy based on homomorphic encryption. The algorithm encrypted the edge weight information and outsourced the encrypted data into cloud. Following the breadth-first principle, cloud servers could iteratively compute the shortest distance from initial vertex extending to other vertices directly on the encrypted data, getting the shortest distance between two arbitrary vertices on the encrypted graphs. The computation was completed by clients and cloud servers interactively: the major computation was performed by cloud servers;clients only executed simple decryption and judgement operations. This algorithm could make computation constrained clients use cloud to perform computation-intensive shortest distance computing. The edge weight information, intermediate result and final result for the computation could not be leaked during the computing procedure. The analysis and experiments demonstrated its security and validity.
The resource scheduling of platform as a service (PaaS) was studied. Firstly, the generic architecture of PaaS and the related key technologies were illustrated. Secondly, the diversity of the resource scheduling of P...
详细信息
The resource scheduling of platform as a service (PaaS) was studied. Firstly, the generic architecture of PaaS and the related key technologies were illustrated. Secondly, the diversity of the resource scheduling of PaaS was stated. Then the design in which machine learning was adopted to optimize the resource scheduling of PaaS. After the analysis of a variety of machine learning algorithms, decision tree algorithm was used in the resource scheduling of PaaS. In the end, the specific algorithm model and the possessing procedure were brought forward. It is shown that to introduce machine learning into resource scheduling in PaaS could effectively solve the problem to decide the time of scaling operations in PaaS.
暂无评论