Academic literature on the topic 'Cloud overlay networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud overlay networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cloud overlay networks"
Ghazali, Osman, and Shahzada Khurram. "Enhanced IPFIX flow monitoring for VXLAN based cloud overlay networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 5519. http://dx.doi.org/10.11591/ijece.v9i6.pp5519-5528.
Full textRamadan, Osama R. S., Mohamed Yasin I. Afifi, and Ahmed Yahya. "A Distributed Cloud Architecture Based on General De Bruijn Overlay Network." International Journal of Cloud Applications and Computing 14, no. 1 (February 27, 2024): 1–19. http://dx.doi.org/10.4018/ijcac.339892.
Full textWang, Jessie Hui, Jeffrey Cai, Jerry Lu, Kevin Yin, and Jiahai Yang. "Solving multicast problem in cloud networks using overlay routing." Computer Communications 70 (October 2015): 1–14. http://dx.doi.org/10.1016/j.comcom.2015.05.016.
Full textWei, Ming, Ming Zhu, Yaoyuan Zhang, Jiaqi Sun, and Jiarong Wang. "Cyclic Global Guiding Network for Point Cloud Completion." Remote Sensing 14, no. 14 (July 9, 2022): 3316. http://dx.doi.org/10.3390/rs14143316.
Full textGharib, Mohammed, Marzieh Malekimajd, and Ali Movaghar. "SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems." Algorithms 11, no. 10 (October 2, 2018): 150. http://dx.doi.org/10.3390/a11100150.
Full textKAWASHIMA, Ryota, and Hiroshi MATSUO. "Non-tunneling Overlay Approach for Virtual Tenant Networks in Cloud Datacenter." IEICE Transactions on Communications E97.B, no. 11 (2014): 2259–68. http://dx.doi.org/10.1587/transcom.e97.b.2259.
Full textBarabash, Kathy, David Breitgand, Etai Lev-Ran, Dean H. Lorenz, and Danny Raz. "A case for an open customizable cloud network." ACM SIGCOMM Computer Communication Review 52, no. 2 (April 30, 2022): 56–62. http://dx.doi.org/10.1145/3544912.3544919.
Full textPham, Van-Nam, VanDung Nguyen, Tri D. T. Nguyen, and Eui-Nam Huh. "Efficient Edge-Cloud Publish/Subscribe Broker Overlay Networks to Support Latency-Sensitive Wide-Scale IoT Applications." Symmetry 12, no. 1 (December 18, 2019): 3. http://dx.doi.org/10.3390/sym12010003.
Full textQian, He, Wang Yong, Li Jia, and Cai Mengfei. "Publish/Subscribe and JXTA based Cloud Service Management with QoS." International Journal of Grid and High Performance Computing 8, no. 3 (July 2016): 24–37. http://dx.doi.org/10.4018/ijghpc.2016070102.
Full textLi, Yanjun, Guoqing Zhang, and Guoqiang Zhang. "ISP-Friendly Data Scheduling by Advanced Locality-Aware Network Coding for P2P Distribution Cloud." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/968328.
Full textDissertations / Theses on the topic "Cloud overlay networks"
Alliche, Abderrahmane Redha. "Contrôle du réseau cloud basé intelligence artificielle." Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4022.
Full textThe exponential growth of Internet traffic in recent decades has prompted the emergence of Content Delivery Networks (CDNs) as a solution for managing high traffic volumes through data caching in cloud servers located near end-users. However, challenges persist, particularly for non-cacheable services, necessitating the use of cloud overlay networks. Due to a lack of knowledge about the underlay network, cloud overlay networks introduce complexities such as Triangle inequality violations (TIV) and dynamic traffic routing challenges.Leveraging the Software Defined Networks (SDN) paradigm, Deep Reinforcement Learning (DRL) techniques offer the possibility to exploit collected data to better adapt to network changes. Furthermore, the increase of cloud edge servers presents scalability challenges, motivating the exploration of Multi-Agent DRL (MA-DRL) solutions. Despite its suitability for the distributed packet routing problem in cloud overlay networks, MA-DRL faces non-addressed challenges such as the need for realistic network simulators, handling communication overhead, and addressing the multi-objective nature of the routing problem.This Ph.D. thesis delves into the realm of distributed Multi-Agent Deep Reinforcement Learning (MA-DRL) methods, specifically targeting the Distributed Packet Routing problem in cloud overlay networks. Throughout the thesis, we address these challenges by developing realistic network simulators, studying communication overhead in the non-overlay general setting, and proposing a distributed MA-DRL framework tailored to cloud overlay networks, focusing on communication overhead, convergence, and model stability
Ariyattu, Resmi. "Towards federated social infrastructures for plug-based decentralized social networks." Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S031/document.
Full textIn this thesis, we address two issues in the area of decentralized distributed systems: network-aware overlays and collaborative editing. Even though network overlays have been extensively studied, most solutions either ignores the underlying physical network topology, or uses mechanisms that are specific to a given platform or applications. This is problematic, as the performance of an overlay network strongly depends on the way its logical topology exploits the underlying physical network. To address this problem, we propose Fluidify, a decentralized mechanism for deploying an overlay network on top of a physical infrastructure while maximizing network locality. Fluidify uses a dual strategy that exploits both the logical links of an overlay and the physical topology of its underlying network to progressively align one with the other. The resulting protocol is generic, efficient, scalable and can substantially improve network overheads and latency in overlay based systems. The second issue that we address focuses on collaborative editing platforms. Distributed collaborative editors allow several remote users to contribute concurrently to the same document. Only a limited number of concurrent users can be supported by the currently deployed editors. A number of peer-to-peer solutions have therefore been proposed to remove this limitation and allow a large number of users to work collaboratively. These decentralized solution assume however that all users are editing the same set of documents, which is unlikely to be the case. To open the path towards more flexible decentralized collaborative editors, we present Filament, a decentralized cohort-construction protocol adapted to the needs of large-scale collaborative editors. Filament eliminates the need for any intermediate DHT, and allows nodes editing the same document to find each other in a rapid, efficient and robust manner by generating an adaptive routing field around themselves. Filament's architecture hinges around a set of collaborating self-organizing overlays that utilizes the semantic relations between peers. The resulting protocol is efficient, scalable and provides beneficial load-balancing properties over the involved peers
Duarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.
Full textMed framväxten av molninbyggda applikationer skapar behovet av säkra nätverk och tjänster nya krav på automatisering, hanterbarhet och skalbarhet över datacenter. Flera lösningar har utvecklats för att övervinna begränsningarna i den konventionella och väletablerade IPsec-sviten som en säker tunnellösning. En strategi för att möta dessa nya krav har varit utformningen av mjukvarubaserade överläggsnätverk. I den här avhandlingen bedömer vi implementeringen av en traditionell IPsec VPN-lösning mot ett nytt säkert överläggsmeshnätverk som kallas Nebula. Vi genomför en fallstudie genom att bygga upp ett ett experimentellt system för att utvärdera Nebula inom fyra nyckelområden: tillförlitlighet, säkerhet, hanterbarhet och prestanda. Vi diskuterar styrkan i Nebula och dess begränsningar för att säkra kommunikation mellan tjänster i distribuerade molnapplikationer. När det gäller tillförlitlighet visar avhandlingen att Nebula inte uppfyller sina egna mål om att uppnå värd-tillvärd- anslutning när man försöker korsa specifika brandväggar och NAT. När det gäller säkerhet tillhandahåller Nebula certifikatbaserad autentisering och använder aktuella och snabba kryptografiska algoritmer och protokoll från Noise-ramverket. När det gäller hanterbarhet är Nebula en modern lösning med en löst kopplad design som möjliggör skalbarhet med molnklara funktioner och enklare distribution än IPsec. Slutligen visar prestandan hos Nebula tydligt en overhead för att vara en användarutrymme-programvara. Dock kan kostnaderna anses vara acceptabla i vissa server-till-server-mikroserviceinteraktioner och är en rättvis avvägning om vi tar i betraktande dess enkla hantering jämfört med IPsec.
Fressancourt, Antoine. "Conception et mise en oeuvre d'overlays réseau dynamiques pour la résilience du Cloud : Vers une flexibilité et une résilience accrue du Cloud Computing." Electronic Thesis or Diss., Paris, ENST, 2016. https://pastel.hal.science/tel-03690026.
Full textNowadays, Internet services as well as applications delivered using Cloud Computing are hosted in large datacenters. The Cloud Service Providers (CSP) commit to give to their customers access to their infrastructures with a high level of availability. They also target a high level of reliability of the data processed in their computing infrastructure. In order to respect those commitments, CSPs replicate the applications they run and the associated data in remote datacenters. From a CSP’s perspective, ensuring a high level of availability and reliability must be achieved while keeping the operational and capital expenditures as limited as possible. The coordinated operation of cloud applications from a set of remote datacenters requires using a performant and resilient connection scheme. In that extend, most CSPs deploy a mesh of private protected links rented from Internet service providers between their datacenters. A priori, such a connection scheme is costly and poorly flexible. Besides,from a CSP’s point of view, including a new datacenter in the desired network is an expensive approach. The goal of this PhD thesis is to allow CSPs to ensure their datacenter interconnections’ resiliency using a flexible and affordable connection scheme. In that extend, we take advantage of the fact that datacenters are most of the time connected to the Internet through several Internet service providers. We design an overlay network architecture, referred as Kumori. Kumori stands for "cloudy" in Japanese. This architecture aims to detect and to react quickly to link or node failures affecting inter-datacenter communications over the Internet. This overlay consists in routing inflection points placed at Internet Exchange Points (IXP). The Kumori architecture is managed by a central controller. After the description of the Kumori architecture, we evaluate its characteristics in terms of performance and resiliency. First, we compare Kumori’s performance to the performance achieved by RON (Resilient Overlay Network), another overlay network architecture aiming at enhancing resiliency over the Internet. We then, characterize the resiliency benefits provided by the Kumori architecture. To do so, we evaluate the number of disjoint paths that it can establish between the datacenters of two CSPs: Atos and Amazon. For the sake of this evaluation, we build a directed graph representation of the Internet using three public data sources in which the graph nodes represent the various operators’ geographical points of presence (PoP). Our Internet representation allows us to take into account the differences between network operators in the Internet. One of the major challenges we faced during this evaluation is related to the very large size of the graph we obtained, and to the algorithmic complexity of the path diversity search algorithm. At last, we discuss an evaluation of Kumori’s costs of operation in order to evaluate the economical potential of this architecture
Khan, Imran. "Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019/document.
Full textWireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
Khan, Imran. "Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019.
Full textWireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
"FADE: secure overlay cloud storage with access control and file assured deletion." 2011. http://library.cuhk.edu.hk/record=b5894616.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 60-65).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Policy-based File Assured Deletion --- p.7
Chapter 2.1 --- Background --- p.7
Chapter 2.2 --- Policy-based Deletion --- p.9
Chapter 3 --- Basic Design of FADE --- p.13
Chapter 3.1 --- Entities --- p.13
Chapter 3.2 --- Deployment --- p.15
Chapter 3.3 --- "Security Goals, Threat Models, and Assumptions" --- p.16
Chapter 3.4 --- The Basics - File Upload/Download --- p.18
Chapter 3.5 --- Policy Revocation for File Assured Deletion --- p.23
Chapter 3.6 --- Multiple Policies --- p.23
Chapter 3.7 --- Policy Renewal --- p.25
Chapter 4 --- Extensions of FADE --- p.27
Chapter 4.1 --- Access Control with ABE --- p.27
Chapter 4.2 --- Multiple Key Managers --- p.31
Chapter 5 --- Implementation --- p.35
Chapter 5.1 --- Representation of Metadata --- p.36
Chapter 5.2 --- Client --- p.37
Chapter 5.3 --- Key Managers --- p.38
Chapter 6 --- Evaluation --- p.40
Chapter 6.1 --- Experimental Results on Time Performance of FADE --- p.41
Chapter 6.1.1 --- Evaluation of Basic Design --- p.42
Chapter 6.1.2 --- Evaluation of Extensions --- p.46
Chapter 6.2 --- Space Utilization of FADE --- p.49
Chapter 6.3 --- Cost Model --- p.51
Chapter 6.4 --- Lessons Learned --- p.53
Chapter 7 --- Related Work --- p.54
Chapter 8 --- Conclusions --- p.58
Bibliography --- p.60
Books on the topic "Cloud overlay networks"
Toy, Mehmet. Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing. Springer International Publishing AG, 2022.
Find full textFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Full textBook chapters on the topic "Cloud overlay networks"
Walkowiak, Krzysztof. "Overlay Networks." In Modeling and Optimization of Cloud-Ready and Content-Oriented Networks, 195–255. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30309-3_4.
Full textSitaraman, Ramesh K., Mangesh Kasbekar, Woody Lichtenstein, and Manish Jain. "Overlay Networks: An Akamai Perspective." In Advanced Content Delivery, Streaming, and Cloud Services, 305–28. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118909690.ch16.
Full textMatos, Miguel, António Sousa, José Pereira, Rui Oliveira, Eric Deliot, and Paul Murray. "CLON: Overlay Networks and Gossip Protocols for Cloud Environments." In On the Move to Meaningful Internet Systems: OTM 2009, 549–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05148-7_41.
Full textAljaedi, Amer, C. Edward Chow, and Jia Rao. "Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks." In Advances in Intelligent Systems and Computing, 25–37. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32467-8_3.
Full textZhang, Lei, and Le Chen. "Constructing a Logical Network (Overlay Network) in a DC." In Cloud Data Center Network Architectures and Technologies, 175–210. First edition. | Boca Raton : CRC Press, 2021. | Summary: “This book has: CRC Press, 2021. http://dx.doi.org/10.1201/9781003143185-6.
Full textAl-Asfoor, Muntasir, and Mohammed Hamzah Abed. "The Effect of the Topology Adaptation on Search Performance in Overlay Network." In Expert Clouds and Applications, 65–73. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_7.
Full textLiu, Qian, Juan Gu, Jingchao Yang, Yun Li, Dexuan Sha, Mengchao Xu, Ishan Shams, Manzhu Yu, and Chaowei Yang. "Cloud, Edge, and Mobile Computing for Smart Cities." In Urban Informatics, 757–95. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8983-6_41.
Full textKhurram, Shahzada, and Osman Ghazali. "Design and Development of VXLAN Based Cloud Overlay Network Monitoring System and Environment." In Advances in Intelligent Systems and Computing, 141–47. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77028-4_22.
Full textLi, Xiang, Jianwen Sun, Chung-Ming Own, and Wenyuan Tao. "Gaussian Mixture Model-Based Registration Network for Point Clouds with Partial Overlap." In Lecture Notes in Computer Science, 405–16. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15934-3_34.
Full textRao, Voore Subba, and K. Srinivas. "Reduce Overall Execution Cost (OEC) of Computation Offloading in Mobile Cloud Computing for 5G Network Using Nature Inspired Computing (NIC) Algorithms." In Mobile Radio Communications and 5G Networks, 679–90. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7018-3_51.
Full textConference papers on the topic "Cloud overlay networks"
Cai, Chris X., Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom, and Roy H. Campbell. "CRONets: Cloud-Routed Overlay Networks." In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.49.
Full textMercan, Suat. "Cloud Assisted Overlay Routing." In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2018. http://dx.doi.org/10.1109/icufn.2018.8436951.
Full textTammineni, Lavanya, and Mina Guirguis. "Toward local overlay-based Mobile Clouds." In 2016 3rd Smart Cloud Networks & Systems (SCNS). IEEE, 2016. http://dx.doi.org/10.1109/scns.2016.7870556.
Full textMachado, Guilherme Sperb, Thomas Bocek, Michael Ammann, and Burkhard Stiller. "A Cloud Storage overlay to aggregate heterogeneous Cloud services." In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/lcn.2013.6761296.
Full textAlliche, Redha A., Tiago Da Silva Barros, Ramon Aparicio-Pardo, and Lucile Sassatelli. "prisma-v2: Extension to Cloud Overlay Networks." In 2023 23rd International Conference on Transparent Optical Networks (ICTON). IEEE, 2023. http://dx.doi.org/10.1109/icton59386.2023.10207272.
Full textChoochotkaew, Sunyanan, Tatsuhiro Chiba, Scott Trent, and Marcelo Amaral. "Bypass Container Overlay Networks with Transparent BPF-driven Socket Replacement." In 2022 IEEE 15th International Conference on Cloud Computing (CLOUD). IEEE, 2022. http://dx.doi.org/10.1109/cloud55607.2022.00033.
Full textTrifa, Zied, and Maher Khemakhem. "Securing Structured P2P Overlay Networks." In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2013. http://dx.doi.org/10.1109/3pgcic.2013.13.
Full textTato, Genc, Marin Bertier, and Cedric Tedeschi. "Designing Overlay Networks for Decentralized Clouds." In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2017. http://dx.doi.org/10.1109/cloudcom.2017.64.
Full textKuo, Jian-Jhih, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, and Wen-Tsuen Chen. "Service Overlay Forest Embedding for Software-Defined Cloud Networks." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.62.
Full textBeigi-Mohammadi, Nasim, Hamzeh Khazaei, Mark Shtern, Cornel Barna, and Marin Litoiu. "Adaptive service management for cloud applications using overlay networks." In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2017. http://dx.doi.org/10.23919/inm.2017.7987302.
Full text