期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
Pervasive Dependability in Wireless Cloud Networking: a BlueGreen Topological Control Approach
1
作者 William Liu 《China Communications》 SCIE CSCD 2011年第6期1-10,共10页
The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptograph... The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptographic protection on wireless communication respectively, as well as minimizing energy consumption (i.e., Green criteria) by switching off unnecessary resources as much as possible. There is a contradiction to satisfy both Blue and Green design criteria simultaneously. In this paper, we propose a new BlueGreen topological control scheme to leverage the wireless link connectivity for WCNs using an adaptive encryption key allocation mechanism, named as Shared Backup Path Keys (SBPK). The BlueGreen SBPK can take into account the network dependable requirements such as service resilience, security assurance and energy efficiency as a whole, so as trading off between them to find an optimal solution. Actually, this challenging problem can be modeled as a global optimization problem, where the network working and backup elements such as nodes, links, encryption keys and their energy consumption are considered as a resource, and their utilization should be minimized. The case studies confirm that there is a trade-off optimal solution between the capacity efficiency and energy efficiency to achieve the dependable WCNs. 展开更多
关键词 wireless cloud networking service resilience security assurance energy efficiecy BlueGreen shared backup path keys
在线阅读 下载PDF
Enhancing Healthcare Data Privacy in Cloud IoT Networks Using Anomaly Detection and Optimization with Explainable AI (ExAI)
2
作者 Jitendra Kumar Samriya Virendra Singh +4 位作者 Gourav Bathla Meena Malik Varsha Arya Wadee Alhalabi Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3893-3910,共18页
The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated cha... The integration of the Internet of Things(IoT)into healthcare systems improves patient care,boosts operational efficiency,and contributes to cost-effective healthcare delivery.However,overcoming several associated challenges,such as data security,interoperability,and ethical concerns,is crucial to realizing the full potential of IoT in healthcare.Real-time anomaly detection plays a key role in protecting patient data and maintaining device integrity amidst the additional security risks posed by interconnected systems.In this context,this paper presents a novelmethod for healthcare data privacy analysis.The technique is based on the identification of anomalies in cloud-based Internet of Things(IoT)networks,and it is optimized using explainable artificial intelligence.For anomaly detection,the Radial Boltzmann Gaussian Temporal Fuzzy Network(RBGTFN)is used in the process of doing information privacy analysis for healthcare data.Remora Colony SwarmOptimization is then used to carry out the optimization of the network.The performance of the model in identifying anomalies across a variety of healthcare data is evaluated by an experimental study.This evaluation suggested that themodel measures the accuracy,precision,latency,Quality of Service(QoS),and scalability of themodel.A remarkable 95%precision,93%latency,89%quality of service,98%detection accuracy,and 96%scalability were obtained by the suggested model,as shown by the subsequent findings. 展开更多
关键词 Healthcare data privacy analysis anomaly detection cloud IoT network explainable artificial intelligence temporal fuzzy network
在线阅读 下载PDF
A Coarse to Fine Thin Cloud Removal Network with Pyramid Non-local Attention
3
作者 GUAN Wang TIAN Zhenkai +5 位作者 MA Tao ZHAO Lingyuan XIE Shizhe YAN Jin DU Yang ZOU Yunkun 《Transactions of Nanjing University of Aeronautics and Astronautics》 2025年第5期589-600,共12页
In remote sensing imagery,approximately 67%of the data are affected by cloud cover,significantly increasing the difficulty of image classification,recognition,and other downstream interpretation tasks.To effectively a... In remote sensing imagery,approximately 67%of the data are affected by cloud cover,significantly increasing the difficulty of image classification,recognition,and other downstream interpretation tasks.To effectively address the randomness of cloud distribution and the non-uniformity of cloud thickness,we propose a coarse-to-fine thin cloud removal architecture based on the observations of the random distribution and uneven thickness of cloud.In the coarse-level declouding network,we innovatively introduce a multi-scale attention mechanism,i.e.,pyramid nonlocal attention(PNA).By integrating global context with local detail information,it specifically addresses image quality degradation caused by the uncertainty in cloud distribution.During the fine-level declouding stage,we focus on the impact of cloud thickness on declouding results(primarily manifested as insufficient detail information).Through a carefully designed residual dense module,we significantly enhance the extraction and utilization of feature details.Thus,our approach precisely restores lost local texture features on top of coarse-level results,achieving a substantial leap in declouding quality.To evaluate the effectiveness of our cloud removal technology and attention mechanism,we conducted comprehensive analyses on publicly available datasets.Results demonstrate that our method achieves state-of-the-art performance across a wide range of techniques. 展开更多
关键词 channel attention thin cloud removal network pyramid non-local attention(PNA) remote sensing image residual dense connection
在线阅读 下载PDF
A Novel Load Balancing Strategy of Software-Defined Cloud/Fog Networking in the Internet of Vehicles 被引量:13
4
作者 Xiuli He Zhiyuan Ren +1 位作者 Chenhua Shi Jian Fang 《China Communications》 SCIE CSCD 2016年第S2期140-149,共10页
The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networ... The Internet of Vehicles(IoV)has been widely researched in recent years,and cloud computing has been one of the key technologies in the IoV.Although cloud computing provides high performance compute,storage and networking services,the IoV still suffers with high processing latency,less mobility support and location awareness.In this paper,we integrate fog computing and software defined networking(SDN) to address those problems.Fog computing extends computing and storing to the edge of the network,which could decrease latency remarkably in addition to enable mobility support and location awareness.Meanwhile,SDN provides flexible centralized control and global knowledge to the network.In order to apply the software defined cloud/fog networking(SDCFN) architecture in the IoV effectively,we propose a novel SDN-based modified constrained optimization particle swarm optimization(MPSO-CO) algorithm which uses the reverse of the flight of mutation particles and linear decrease inertia weight to enhance the performance of constrained optimization particle swarm optimization(PSO-CO).The simulation results indicate that the SDN-based MPSO-CO algorithm could effectively decrease the latency and improve the quality of service(QoS) in the SDCFN architecture. 展开更多
关键词 internet of vehicles cloud computing cloud/fog network software defined networking load balancing
在线阅读 下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:2
5
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 Edge Computing cloud Networks Artificial Intelligence Machine Learning cloud Security
在线阅读 下载PDF
Computing Power Network:The Architecture of Convergence of Computing and Networking towards 6G Requirement 被引量:53
6
作者 Xiongyan Tang Chang Cao +4 位作者 Youxiang Wang Shuai Zhang Ying Liu Mingxuan Li Tao He 《China Communications》 SCIE CSCD 2021年第2期175-185,共11页
In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computi... In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computing service with strong demand for computing power,so as to realize the optimization of resource utilization.Based on this,the article discusses the research background,key techniques and main application scenarios of computing power network.Through the demonstration,it can be concluded that the technical solution of computing power network can effectively meet the multi-level deployment and flexible scheduling needs of the future 6G business for computing,storage and network,and adapt to the integration needs of computing power and network in various scenarios,such as user oriented,government enterprise oriented,computing power open and so on. 展开更多
关键词 6G edge computing cloud computing convergence of cloud and network computing power network
在线阅读 下载PDF
Joint Resource Allocation Using Evolutionary Algorithms in Heterogeneous Mobile Cloud Computing Networks 被引量:10
7
作者 Weiwei Xia Lianfeng Shen 《China Communications》 SCIE CSCD 2018年第8期189-204,共16页
The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility ... The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility of users as well as satisfy the required quality of service(QoS) such as the end-to-end response latency experienced by each user. We formulate the problem of joint resource allocation as a combinatorial optimization problem. Three evolutionary approaches are considered to solve the problem: genetic algorithm(GA), ant colony optimization with genetic algorithm(ACO-GA), and quantum genetic algorithm(QGA). To decrease the time complexity, we propose a mapping process between the resource allocation matrix and the chromosome of GA, ACO-GA, and QGA, search the available radio and cloud resource pairs based on the resource availability matrixes for ACOGA, and encode the difference value between the allocated resources and the minimum resource requirement for QGA. Extensive simulation results show that our proposed methods greatly outperform the existing algorithms in terms of running time, the accuracy of final results, the total utility, resource utilization and the end-to-end response latency guaranteeing. 展开更多
关键词 heterogeneous mobile cloud computing networks resource allocation genetic algorithm ant colony optimization quantum genetic algorithm
在线阅读 下载PDF
Visualization of flatness pattern recognition based on T-S cloud inference network 被引量:2
8
作者 张秀玲 赵亮 +1 位作者 臧佳音 樊红敏 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第2期560-566,共7页
Flatness pattern recognition is the key of the flatness control. The accuracy of the present flatness pattern recognition is limited and the shape defects cannot be reflected intuitively. In order to improve it, a nov... Flatness pattern recognition is the key of the flatness control. The accuracy of the present flatness pattern recognition is limited and the shape defects cannot be reflected intuitively. In order to improve it, a novel method via T-S cloud inference network optimized by genetic algorithm(GA) is proposed. T-S cloud inference network is constructed with T-S fuzzy neural network and the cloud model. So, the rapid of fuzzy logic and the uncertainty of cloud model for processing data are both taken into account. What's more, GA possesses good parallel design structure and global optimization characteristics. Compared with the simulation recognition results of traditional BP Algorithm, GA is more accurate and effective. Moreover, virtual reality technology is introduced into the field of shape control by Lab VIEW, MATLAB mixed programming. And virtual flatness pattern recognition interface is designed.Therefore, the data of engineering analysis and the actual model are combined with each other, and the shape defects could be seen more lively and intuitively. 展开更多
关键词 pattern recognition T-S cloud inference network cloud model mixed programming virtual reality visual recognition
在线阅读 下载PDF
Efficient Video Transmission in D2D Assisted Mobile Cloud Networks 被引量:1
9
作者 Cheng Zhan Zhe Wen 《China Communications》 SCIE CSCD 2016年第8期74-83,共10页
The increasing popularity of smart mobile devices and the rise of online services has increased the requirements for efficient dissemination of social video contents. In this paper,we study the problem of distributing... The increasing popularity of smart mobile devices and the rise of online services has increased the requirements for efficient dissemination of social video contents. In this paper,we study the problem of distributing video from cloud server to users in partially connected cooperative D2 D network using network coding. In such a scenario, the transmission conflicts occur from simultaneous transmissions of multiple devices, and the scheduling decision should be made not only on the encoded packets but also on the set of transmitting devices. We analyze the lower bound and give an integer linear formulation of the joint optimization problem over the set of transmitting devices and the packet combinations.We also propose a heuristic solution for this setup using a conflict graph and local graph at every device. Simulation results show that our coding scheme significantly reduces the number of transmission slots, which will increase the efficiency of video delivery. 展开更多
关键词 network coding video delivery device-to-device mobile cloud networks
在线阅读 下载PDF
Semi-Blind Pilot-Aided Channel Estimation in Uplink Cloud Radio Access Networks 被引量:1
10
作者 Yourong Ban Qiang Hu +1 位作者 Zhendong Mao Zhongyuan Zhao 《China Communications》 SCIE CSCD 2016年第9期72-79,共8页
In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimatio... In this paper, a quasi-Newton method fbr semi-blind estimation is derived for channel estimation in uplink cloud radio access networks (C-RANs). Different from traditional pilot-aided estimation, semiblind estimation utilizes the unknown data symbols in addition to the known pilot symbols to estimate the channel. An initial channel state information (CSI) obtained by least-squared (LS) estimation is needed in semi-blind estimation. BFGS (Brayben, Fletcher, Goldfarb and Shanno) algorithm, which employs data as well as pilot symbols, estimates the CSI though solving the problem provided by maximum-likelihood (ML) principle. In addition, mean-square-error (MSE) used to evaluate the estimation performance can be further minimized with an optimal pilot design. Simulation results show that the semi-blind estimation achieves a significant improvement in terms of MSE performance over the conventional LS estimation by utilizing data symbols instead of increasing the number of pilot symbols, which demonstrates the estimation accuracy and spectral efficiency are both improved by semiblind estimation for C-RANs. 展开更多
关键词 cloud radio access networks semi-blind channel estimation
在线阅读 下载PDF
Energy-Performance Tradeoffs in laaS Cloud with Virtual Machine Scheduling 被引量:3
11
作者 DONG Jiankang WANG Hongbo CHENG Shiduan 《China Communications》 SCIE CSCD 2015年第2期155-166,共12页
In the cloud data centers,how to map virtual machines(VMs) on physical machines(PMs) to reduce the energy consumption is becoming one of the major issues,and the existing VM scheduling schemes are mostly to reduce ene... In the cloud data centers,how to map virtual machines(VMs) on physical machines(PMs) to reduce the energy consumption is becoming one of the major issues,and the existing VM scheduling schemes are mostly to reduce energy consumption by optimizing the utilization of physical servers or network elements.However,the aggressive consolidation of these resources may lead to network performance degradation.In view of this,this paper proposes a two-stage VM scheduling scheme:(1) We propose a static VM placement scheme to minimize the number of activating PMs and network elements to reduce the energy consumption;(2) In the premise of minimizing the migration costs,we propose a dynamic VM migration scheme to minimize the maximum link utilization to improve the network performance.This scheme makes a tradeoff between energy efficiency and network performance.We design a new twostage heuristic algorithm for a solution,and the simulations show that our solution achieves good results. 展开更多
关键词 IaaS cloud virtual machine scheduling network performance energy efficiency
在线阅读 下载PDF
A Novel Stateful PCE-Cloud Based Control Architecture of Optical Networks for Cloud Services 被引量:1
12
作者 QIN Panke CHEN Xue +1 位作者 WANG Lei WANG Liqian 《China Communications》 SCIE CSCD 2015年第10期117-127,共11页
The next-generation optical network is a service oriented network,which could be delivered by utilizing the generalized multiprotocol label switching(GMPLS) based control plane to realize lots of intelligent features ... The next-generation optical network is a service oriented network,which could be delivered by utilizing the generalized multiprotocol label switching(GMPLS) based control plane to realize lots of intelligent features such as rapid provisioning,automated protection and restoration(P&R),efficient resource allocation,and support for different quality of service(QoS) requirements.In this paper,we propose a novel stateful PCE-cloud(SPC)based architecture of GMPLS optical networks for cloud services.The cloud computing technologies(e.g.virtualization and parallel computing) are applied to the construction of SPC for improving the reliability and maximizing resource utilization.The functions of SPC and GMPLS based control plane are expanded according to the features of cloud services for different QoS requirements.The architecture and detailed description of the components of SPC are provided.Different potential cooperation relationships between public stateful PCE cloud(PSPC) and region stateful PCE cloud(RSPC) are investigated.Moreover,we present the policy-enabled and constraint-based routing scheme base on the cooperation of PSPC and RSPC.Simulation results for verifying the performance of routing and control plane reliability are analyzed. 展开更多
关键词 optical networks control plane GMPLS stateful PCE cloud computing Qo S
在线阅读 下载PDF
Binary Multifold Encryption Technique for Complex Cloud Systems
13
作者 N.Ansgar Mary T.Latha 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1199-1213,共15页
Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid... Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated usinga variety of molecular methods. Many security mechanisms including knowledgebased authentication, two-factor authentication, adaptive authentication, multifactorauthentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most ofthem are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique Hybrid helix scuttle-deoxy ribo nucleic acids(HHS-DNA) encryption algorithm has been proposed which is inspired by DNAcryptography and Helix scuttle. The proposed HHS-DNA is a type of multifold binary version of DNA (MF-BDNA). The major role of this paper is to present a multifold HHS-DNA algorithm to encrypt the cloud data assuring more security with lesscomplexity. The experimentation is carried out and it reduces the encryption time,cipher text size, and improves throughput. When compared with previous techniques, there is a 45% improvement in throughput, 37% fast in encryption time,54.67% cipher text size. The relevant experimental results and foregoing analysisshow that this method is of good robustness, stability, and security. 展开更多
关键词 CRYPTOGRAPHY cloud network deoxy ribo nucleic acid(DNA) ENCRYPTION security cloud service provider(CSP)
在线阅读 下载PDF
An Algorithm to Recognize the Target Object Contour Based on 2D Point Clouds by Laser-CCD-Scanning 被引量:1
14
作者 MAO Hongyong SHI Duanwei +4 位作者 ZHOU Ji XU Pan CHEN Shiyu XU Yuxiang FENG Fan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期355-361,共7页
For a vision measurement system consisted of laser-CCD scanning sensors, an algorithm is proposed to extract and recognize the target object contour. Firstly, the two-dimensional(2D) point cloud that is output by th... For a vision measurement system consisted of laser-CCD scanning sensors, an algorithm is proposed to extract and recognize the target object contour. Firstly, the two-dimensional(2D) point cloud that is output by the integrated laser sensor is transformed into a binary image. Secondly, the potential target object contours are segmented and extracted based on the connected domain labeling and adaptive corner detection. Then, the target object contour is recognized by improved Hu invariant moments and BP neural network classifier. Finally, we extract the point data of the target object contour through the reverse transformation from a binary image to a 2D point cloud. The experimental results show that the average recognition rate is 98.5% and the average recognition time is 0.18 s per frame. This algorithm realizes the real-time tracking of the target object in the complex background and the condition of multi-moving objects. 展开更多
关键词 laser-CCD scanning sensor 2D point cloud contour recognition improved Hu invariant moments BP neural network
原文传递
Research on Optimized Allocation of English Teaching Resources Based on Network Cloud Platform
15
作者 LIU Yajuan 《International English Education Research》 2018年第1期73-76,共4页
The allocation of resources in English teaching can improve the ability of resource sharing, in order to optimize the allocation of resources, so as to improve the performance of English teaching, and promote the cons... The allocation of resources in English teaching can improve the ability of resource sharing, in order to optimize the allocation of resources, so as to improve the performance of English teaching, and promote the construction of English teaching resources database, a method of optimizing the allocation of English teaching resources is proposed based on network cloud platform. Text semantic key words conceptual decision tree model is constructed for massive English teaching resources allocation, semantic information conversion method is used to compute key semantic features of English Teaching resources, the concept convergence point of English Teaching resource allocation is formed in semantic model. According to the set between the upper and lower relationship, a decision tree model of English Teaching semantic subject words is constructed, semantic conversion and information extraction are realized. English teaching resources optimization allocation simulation is taken in the cloud platform, simulation results show that the scheduling performance of English teaching resources is better, and the adaptive allocation ability of English teaching resources is stronger, and the resource utilization rate is higher. 展开更多
关键词 Network cloud platform English teaching resources Allocation: Decision tree model
在线阅读 下载PDF
ZTE Cloud Radio Solution to Usher in New Era of High-Performance LTE Networks
16
作者 ZTE Corporation 《ZTE Communications》 2013年第2期37-37,共1页
ZTE showcased its innovative cloud radio solution for 4G network optimization at the Mobile Asia Expo in Shanghai.
关键词 LTE RADIO ZTE cloud Radio Solution to Usher in New Era of High-Performance LTE Networks
在线阅读 下载PDF
The Interaction between Control and Computing Theories:New Approaches 被引量:11
17
作者 Magdi S.Mahmoud Yuanqing Xia 《International Journal of Automation and computing》 EI CSCD 2017年第3期254-274,共21页
Day by day, networked control system(NCS) methods have been promoted for distributed closed-loop control systems.Interestingly, the integration of control and computing theories enhanced the development of networked... Day by day, networked control system(NCS) methods have been promoted for distributed closed-loop control systems.Interestingly, the integration of control and computing theories enhanced the development of networked control systems through remote control for wide applications employing the internet. Two further directions to networked control technology are LeaderFollower systems and model predictive control systems. Cloud control system is looked at an extension of networked control systems(NCS) using internet of things(IOT) methodologies. In this paper, a comprehensive literature survey of the new technology of control systems application performed on cloud computing is presented. 展开更多
关键词 Networked control system(NCS) cloud control system network constraints leader-follower system model predictive control
原文传递
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
18
作者 Huan Wang Yunlong Tang +4 位作者 Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li 《High-Confidence Computing》 EI 2024年第2期50-61,共12页
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environment on defense decisions,thus resulting in poor defense effectiveness.Therefore,this paper proposes a cloud boundary network active defense model and decision method based on the reinforcement learning of intelligent agent,designs the network structure of the intelligent agent attack and defense game,and depicts the attack and defense game process of cloud boundary network;constructs the observation space and action space of reinforcement learning of intelligent agent in the non-complete information environment,and portrays the interaction process between intelligent agent and environment;establishes the reward mechanism based on the attack and defense gain,and encourage intelligent agents to learn more effective defense strategies.the designed active defense decision intelligent agent based on deep reinforcement learning can solve the problems of border dynamics,interaction lag,and control dispersion in the defense decision process of cloud boundary networks,and improve the autonomy and continuity of defense decisions. 展开更多
关键词 Active defense decision-making cloud boundary network security Intelligent agent reinforcement learning Offensive and defensive game
在线阅读 下载PDF
A survey of cloud network fault diagnostic systems and tool 被引量:2
19
作者 Yining QI Chongrong FANG +4 位作者 Haoyu LIU Daxiang KANG Biao LYU Peng CHENG Jiming CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第8期1031-1045,共15页
Recently, cloud computing has become a vital part that supports people’s normal lives and production.However, accompanied by the increasing complexity of the cloud network, failures constantly keep coming up and caus... Recently, cloud computing has become a vital part that supports people’s normal lives and production.However, accompanied by the increasing complexity of the cloud network, failures constantly keep coming up and cause huge economic losses. Thus, to guarantee the cloud network performance and prevent execrable effects caused by failures, cloud network diagnostics has become of great interest for cloud service providers. Due to the characteristics of cloud network(e.g., virtualization and multi-tenancy), transplanting traditional network diagnostic tools to the cloud network face several difficulties. Additionally, many existing tools cannot solve problems in the cloud network. In this paper, we summarize and classify the state-of-the-art technologies of cloud diagnostics which can be used in the production cloud network according to their features. Moreover, we analyze the differences between cloud network diagnostics and traditional network diagnostics based on the characteristics of the cloud network. Considering the operation requirements of the cloud network, we propose the points that should be cared about when designing a cloud network diagnostic tool. Also, we discuss the challenges that cloud network diagnostics will face in future development. 展开更多
关键词 cloud network Network diagnostics Network anomaly Network monitoring
原文传递
Integration of IoT and DRAGON-lab in cloud environment 被引量:2
20
作者 FANTong-rang GAOFeng +1 位作者 ZHANGXuan ⅥANGXu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第2期87-91,共5页
Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three laye... Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three layers cloud structure. As an essential part of NGI, the research related to the Internet of things (loT) devices should be applied on the DRAGON-lab platform. This paper proposes an approach to converging the IoT devices to confederation network by integrating each layer of cloud structure between DRAGON-lab and IoT. This research activity extends the use of DRAGON-lab, makes the IoT and wireless sensor network (WSN) devices working well in the confederation network. It was also a foundational research for three layers cloud structure, which could be reused for other related research. Finally, it finishes the preparation work for IoT internet protocol version 6 (IPv6) devices research in DRAGON-Jab, which is essential for the NGI. 展开更多
关键词 DRAGON-lab loT cloud computing confederation network
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部