Literatura científica selecionada sobre o tema "Cloud overlay networks"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cloud overlay networks".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Cloud overlay networks"

1

Ghazali, Osman, e Shahzada Khurram. "Enhanced IPFIX flow monitoring for VXLAN based cloud overlay networks". International Journal of Electrical and Computer Engineering (IJECE) 9, n.º 6 (1 de dezembro de 2019): 5519. http://dx.doi.org/10.11591/ijece.v9i6.pp5519-5528.

Texto completo da fonte
Resumo:
<span lang="EN-US">The demands for cloud computing services is rapidly growing due to its fast adoption and the migration of workloads from private data centers to cloud data centers. Many companies, small and large, prefer switching their data to the enterprise cloud environment rather than expanding their own data centers. As a result, the network traffic in cloud data centers is increasing rapidly. However, due to the dynamic resource provisioning and high-speed virtualized cloud networks, the traditional flow-monitoring systems is unable to provide detail visibility and information of traffic traversing the cloud overlay network environment. Hence, it does not fulfill the monitoring requirement of cloud overlay traffic. As the growth of cloud network traffic causes difficulties for the service providers and end-users to manage the traffic efficiently, an enhanced IPFIX flow monitoring mechanism for cloud overlay networks was proposed to address this problem. The monitoring mechanism provided detail visibility and information of overlay network traffic that traversed the cloud environment, which is not available in the current network monitoring systems. The experimental results showed that the proposed monitoring system able to capture overlay network traffic and segregated the tenant traffic based on virtual machines as compare to the standard monitoring system.</span>
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ramadan, Osama R. S., Mohamed Yasin I. Afifi e Ahmed Yahya. "A Distributed Cloud Architecture Based on General De Bruijn Overlay Network". International Journal of Cloud Applications and Computing 14, n.º 1 (27 de fevereiro de 2024): 1–19. http://dx.doi.org/10.4018/ijcac.339892.

Texto completo da fonte
Resumo:
Distributed cloud systems enable the distribution of computing resources across various geographical locations. While offering benefits like accelerated content delivery, the scalability and coherence maintenance of these systems pose significant challenges. Recent studies reveal shortcomings in existing distributed system schemes to meet modern cloud application demands and maintain coherence among heterogeneous system elements. This paper proposes a service-oriented network architecture for distributed cloud computing networks. Using a De Bruijn network as a software-defined overlay network, the architecture ensures scalability and coherence. Through service-based addressing, requests are issued to designated service address bands, streamlining service discovery. The architecture's evaluation through extensive simulations showcases sustainable scalability and inherent load-balancing properties. The paper concludes with insights into future research directions, emphasizing the extension of the proposed architecture to emerging distributed cloud use cases and decentralized security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Wang, Jessie Hui, Jeffrey Cai, Jerry Lu, Kevin Yin e Jiahai Yang. "Solving multicast problem in cloud networks using overlay routing". Computer Communications 70 (outubro de 2015): 1–14. http://dx.doi.org/10.1016/j.comcom.2015.05.016.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Wei, Ming, Ming Zhu, Yaoyuan Zhang, Jiaqi Sun e Jiarong Wang. "Cyclic Global Guiding Network for Point Cloud Completion". Remote Sensing 14, n.º 14 (9 de julho de 2022): 3316. http://dx.doi.org/10.3390/rs14143316.

Texto completo da fonte
Resumo:
The application of 3D scenes has gradually expanded in recent years. A 3D point cloud is unreliable when it is acquired because of the performance of the sensor. Therefore, it causes difficulties in utilization. Point cloud completion can reconstruct and restore sparse and incomplete point clouds to a more realistic shape. We propose a cyclic global guiding network structure and apply it to point cloud completion tasks. While learning the local details of the whole cloud, our network structure can play a guiding role and will not ignore the overall characteristics of the whole cloud. Based on global guidance, we propose a variety of fitting planes and layered folding attention modules to strengthen the local effect. We use the relationship between the point and the plane to increase the compatibility between the network learning and the original sparse point cloud. We use the attention mechanism of the layer overlay to strengthen the local effect between the encode and decode. Therefore, point clouds are more accurate. Our experiments indicate the effectiveness of our method on the ShapeNet, KITTI, and MVP datasets and are superior to other networks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Gharib, Mohammed, Marzieh Malekimajd e Ali Movaghar. "SLoPCloud: An Efficient Solution for Locality Problem in Peer-to-Peer Cloud Systems". Algorithms 11, n.º 10 (2 de outubro de 2018): 150. http://dx.doi.org/10.3390/a11100150.

Texto completo da fonte
Resumo:
Peer-to-Peer (P2P) cloud systems are becoming more popular due to the high computational capability, scalability, reliability, and efficient data sharing. However, sending and receiving a massive amount of data causes huge network traffic leading to significant communication delays. In P2P systems, a considerable amount of the mentioned traffic and delay is owing to the mismatch between the physical layer and the overlay layer, which is referred to as locality problem. To achieve higher performance and consequently resilience to failures, each peer has to make connections to geographically closer peers. To the best of our knowledge, locality problem is not considered in any well known P2P cloud system. However, considering this problem could enhance the overall network performance by shortening the response time and decreasing the overall network traffic. In this paper, we propose a novel, efficient, and general solution for locality problem in P2P cloud systems considering the round-trip-time (RTT). Furthermore, we suggest a flexible topology as the overlay graph to address the locality problem more effectively. Comprehensive simulation experiments are conducted to demonstrate the applicability of the proposed algorithm in most of the well-known P2P overlay networks while not introducing any serious overhead.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

KAWASHIMA, Ryota, e Hiroshi MATSUO. "Non-tunneling Overlay Approach for Virtual Tenant Networks in Cloud Datacenter". IEICE Transactions on Communications E97.B, n.º 11 (2014): 2259–68. http://dx.doi.org/10.1587/transcom.e97.b.2259.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Barabash, Kathy, David Breitgand, Etai Lev-Ran, Dean H. Lorenz e Danny Raz. "A case for an open customizable cloud network". ACM SIGCOMM Computer Communication Review 52, n.º 2 (30 de abril de 2022): 56–62. http://dx.doi.org/10.1145/3544912.3544919.

Texto completo da fonte
Resumo:
Cloud computing is transforming networking landscape over the last few years. The first order of business for major cloud providers today is to attract as many organizations as possible to their own clouds. To that end cloud providers offer a new generation of managed network solutions to connect the premises of the enterprises to their clouds. To serve their customers better and to innovate fast, major cloud providers are currently on the route to building their own "private Internets", which are idiosyncratic. On the other hand, customers that do not want to stay locked by vendors and who want flexibility in using best-for-the-task services spanning multiple clouds and, possibly, their own premises, seek for solutions that will provide smart overlay connectivity across clouds. The result of these developments is a multiplication of closed idiosyncratic solutions rather than an open standardized ecosystem. In this editorial note we argue for desirability of such an ecosystem, outline the main requirements and sketch possible solutions. We focus on enterprise as our primary use case and illustrate the main ideas through it, but the same principles apply to various different use cases.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Pham, Van-Nam, VanDung Nguyen, Tri D. T. Nguyen e Eui-Nam Huh. "Efficient Edge-Cloud Publish/Subscribe Broker Overlay Networks to Support Latency-Sensitive Wide-Scale IoT Applications". Symmetry 12, n.º 1 (18 de dezembro de 2019): 3. http://dx.doi.org/10.3390/sym12010003.

Texto completo da fonte
Resumo:
Computing services for the Internet-of-Things (IoT) play a vital role for widespread IoT deployment. A hierarchy of Edge-Cloud publish/subscribe (pub/sub) broker overlay networks that support latency-sensitive IoT applications in a scalable manner is introduced. In addition, we design algorithms to cluster edge pub/sub brokers based on topic similarities and geolocations to enhance data dissemination among end-to-end IoT devices. The proposed model is designed to provide low delay data dissemination and effectively save network traffic among brokers. In the proposed model, IoT devices running pub/sub client applications periodically send collected data, organized as a hierarchy of topics, to their closest edge pub/sub brokers. Then, the data are processed/analyzed at edge nodes to make controlling decisions promptly replying to the IoT devices and/or aggregated for further delivery to other interested edge brokers or to cloud brokers for long-term processing, analysis, and storage. Extensive simulation results demonstrate that our proposal achieves the best data delivery latency compared to two baseline schemes, a classical Cloud-based pub/sub scheme and an Edge-Cloud pub/sub scheme. Considering the similar Edge-Cloud technique, the proposed scheme outperforms PubSubCoord-alike in terms of relay traffic ratio among brokers. Therefore, our proposal can adapt well to support wide-scale latency-sensitive IoT applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Qian, He, Wang Yong, Li Jia e Cai Mengfei. "Publish/Subscribe and JXTA based Cloud Service Management with QoS". International Journal of Grid and High Performance Computing 8, n.º 3 (julho de 2016): 24–37. http://dx.doi.org/10.4018/ijghpc.2016070102.

Texto completo da fonte
Resumo:
How to manage cloud services efficiently is difficult for large scale of services with frequently changing Quality of Service (QoS) in cloud computing environment. A multiple-dimension publish/subscribe (pub/sub) and JXTA based cloud service management mechanism, consists of registry overlay, service publisher and subscriber, is proposed to manage cloud services with active QoS refreshing and fast subscribe capability. The registry overlay with multiple managers cooperating on JXTA, can manage large scale services discovery. The service model with QoS describes a formal model for pub/sub based service management, and a fast subscribing algorithm with filter matrix and multi-dimension index is proposed. The filter matrix helps to reduce candidate services and the multi-dimension index is used to find satisfied services fast. Based on pub/sub and JXTA, the cloud management system is realized. The experiments show that the proposed cloud service management mechanism has good publication and subscribing performance, and is faster than traditional methods for large scale cloud services.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Li, Yanjun, Guoqing Zhang e Guoqiang Zhang. "ISP-Friendly Data Scheduling by Advanced Locality-Aware Network Coding for P2P Distribution Cloud". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/968328.

Texto completo da fonte
Resumo:
Peer-to-peer (P2P) file distribution imposes increasingly heavy traffic burden on the Internet service providers (ISPs). The vast volume of traffic pushes up ISPs’ costs in routing and investment and degrades their networks performance. Building ISP-friendly P2P is therefore of critical importance for ISPs and P2P services. So far most efforts in this area focused on improving the locality-awareness of P2P applications, for example, to construct overlay networks with better knowledge of the underlying network topology. There is, however, growing recognition that data scheduling algorithms also play an effective role in P2P traffic reduction. In this paper, we introduce the advanced locality-aware network coding (ALANC) for P2P file distribution. This data scheduling algorithm completely avoids the transmission of linearly dependent data blocks, which is a notable problem of previous network coding algorithms. Our simulation results show that, in comparison to other algorithms, ALANC not only significantly reduces interdomain P2P traffic, but also remarkably improves both the application-level performance (for P2P services) and the network-level performance (for ISP networks). For example, ALANC is 30% faster in distributing data blocks and it reduces the average traffic load on the underlying links by 40%. We show that ALANC holds the above gains when the tit-for-tat incentive mechanism is introduced or the overlay topology changes dynamically.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Cloud overlay networks"

1

Alliche, Abderrahmane Redha. "Contrôle du réseau cloud basé intelligence artificielle". Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4022.

Texto completo da fonte
Resumo:
L'explosion du nombre d'utilisateurs d'Internet et du volume de trafic constitue un défi majeur pour la gestion efficace des réseaux de diffusion de contenu (CDN). Bien que ces réseaux aient amélioré leur temps de réponse en exploitant la mise en cache dans des serveurs cloud proches des utilisateurs, les services non mis en cache continuent de poser des problèmes de gestion de trafic. Pour répondre à cette problématique, les réseaux overlay cloud ont émergé, mais ils introduisent des complexités telles que les violations d'inégalités triangulaires (TIV). Dans ce contexte, l'application du paradigme des réseaux à définition logicielle (SDN) combinée aux techniques d'apprentissage par renforcement profond (DRL) offre une opportunité prometteuse pour s'adapter en temps réel aux fluctuations de l'environnement. Face à l'augmentation constante du nombre de serveurs edge, les solutions distribuées de DRL, notamment les modèles d'apprentissage par renforcement profond multi-agent (MA-DRL), deviennent cruciales. Cependant, ces modèles rencontrent des défis non résolus tels que l'absence de simulateurs réseau réalistes, le surcoût de communication entre agents et la convergence et stabilité.Cette thèse se concentre donc sur l'exploration des méthodes MA-DRL pour le routage de paquets dans les réseaux overlay cloud. Elle propose des solutions pour relever ces défis, notamment le développement de simulateurs de réseau réalistes, l'étude du surcoût de communication et la conception d'une solution MA-DRL adaptée aux réseaux overlay cloud. L'accent est mis sur le compromis entre la performance et la quantité d'information partagée entre les agents, ainsi que sur la convergence et la stabilité durant l'entraînement
The exponential growth of Internet traffic in recent decades has prompted the emergence of Content Delivery Networks (CDNs) as a solution for managing high traffic volumes through data caching in cloud servers located near end-users. However, challenges persist, particularly for non-cacheable services, necessitating the use of cloud overlay networks. Due to a lack of knowledge about the underlay network, cloud overlay networks introduce complexities such as Triangle inequality violations (TIV) and dynamic traffic routing challenges.Leveraging the Software Defined Networks (SDN) paradigm, Deep Reinforcement Learning (DRL) techniques offer the possibility to exploit collected data to better adapt to network changes. Furthermore, the increase of cloud edge servers presents scalability challenges, motivating the exploration of Multi-Agent DRL (MA-DRL) solutions. Despite its suitability for the distributed packet routing problem in cloud overlay networks, MA-DRL faces non-addressed challenges such as the need for realistic network simulators, handling communication overhead, and addressing the multi-objective nature of the routing problem.This Ph.D. thesis delves into the realm of distributed Multi-Agent Deep Reinforcement Learning (MA-DRL) methods, specifically targeting the Distributed Packet Routing problem in cloud overlay networks. Throughout the thesis, we address these challenges by developing realistic network simulators, studying communication overhead in the non-overlay general setting, and proposing a distributed MA-DRL framework tailored to cloud overlay networks, focusing on communication overhead, convergence, and model stability
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ariyattu, Resmi. "Towards federated social infrastructures for plug-based decentralized social networks". Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S031/document.

Texto completo da fonte
Resumo:
Dans cette thèse, nous abordons deux problèmes soulevés par les systèmes distribués décentralisés - le placement de réseaux logiques de façon compatible avec le réseau physique sous-jacent et la construction de cohortes d'éditeurs pour dans les systèmes d'édition collaborative. Bien que les réseaux logiques (overlay networks) été largement étudiés, la plupart des systèmes existant ne prennent pas ou prennent mal en compte la topologie du réseau physique sous-jacent, alors que la performance de ces systèmes dépend dans une grande mesure de la manière dont leur topologie logique exploite la localité présente dans le réseau physique sur lequel ils s'exécutent. Pour résoudre ce problème, nous proposons dans cette thèse Fluidify, un mécanisme décentralisé pour le déploiement d'un réseau logique sur une infrastructure physique qui cherche à maximiser la localité du déploiement. Fluidify utilise une stratégie double qui exploite à la fois les liaisons logiques d'un réseau applicatif et la topologie physique de son réseau sous-jacent pour aligner progressivement l'une avec l'autre. Le protocole résultant est générique, efficace, évolutif et peut améliorer considérablement les performances de l'ensemble. La deuxième question que nous abordons traite des plates-formes d'édition collaborative. Ces plates-formes permettent à plusieurs utilisateurs distants de contribuer simultanément au même document. Seuls un nombre limité d'utilisateurs simultanés peuvent être pris en charge par les éditeurs actuellement déployés. Un certain nombre de solutions pair-à-pair ont donc été proposées pour supprimer cette limitation et permettre à un grand nombre d'utilisateurs de collaborer sur un même document sans aucune coordination centrale. Ces plates-formes supposent cependant que tous les utilisateurs d'un système éditent le même jeu de document, ce qui est peu vraisemblable. Pour ouvrir la voie à des systèmes plus flexibles, nous présentons, Filament, un protocole décentralisé de construction de cohorte adapté aux besoins des grands éditeurs collaboratifs. Filament élimine la nécessité de toute table de hachage distribuée (DHT) intermédiaire et permet aux utilisateurs travaillant sur le même document de se retrouver d'une manière rapide, efficace et robuste en générant un champ de routage adaptatif autour d'eux-mêmes. L'architecture de Filament repose sur un ensemble de réseaux logiques auto-organisées qui exploitent les similarités entre jeux de documents édités par les utilisateurs. Le protocole résultant est efficace, évolutif et fournit des propriétés bénéfiques d'équilibrage de charge sur les pairs impliqués
In this thesis, we address two issues in the area of decentralized distributed systems: network-aware overlays and collaborative editing. Even though network overlays have been extensively studied, most solutions either ignores the underlying physical network topology, or uses mechanisms that are specific to a given platform or applications. This is problematic, as the performance of an overlay network strongly depends on the way its logical topology exploits the underlying physical network. To address this problem, we propose Fluidify, a decentralized mechanism for deploying an overlay network on top of a physical infrastructure while maximizing network locality. Fluidify uses a dual strategy that exploits both the logical links of an overlay and the physical topology of its underlying network to progressively align one with the other. The resulting protocol is generic, efficient, scalable and can substantially improve network overheads and latency in overlay based systems. The second issue that we address focuses on collaborative editing platforms. Distributed collaborative editors allow several remote users to contribute concurrently to the same document. Only a limited number of concurrent users can be supported by the currently deployed editors. A number of peer-to-peer solutions have therefore been proposed to remove this limitation and allow a large number of users to work collaboratively. These decentralized solution assume however that all users are editing the same set of documents, which is unlikely to be the case. To open the path towards more flexible decentralized collaborative editors, we present Filament, a decentralized cohort-construction protocol adapted to the needs of large-scale collaborative editors. Filament eliminates the need for any intermediate DHT, and allows nodes editing the same document to find each other in a rapid, efficient and robust manner by generating an adaptive routing field around themselves. Filament's architecture hinges around a set of collaborating self-organizing overlays that utilizes the semantic relations between peers. The resulting protocol is efficient, scalable and provides beneficial load-balancing properties over the involved peers
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Duarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.

Texto completo da fonte
Resumo:
With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. One strategy to meet these new requirements has been the design of software-based overlay networks. In this thesis, we assess the deployment of a traditional IPsec VPN solution against a new secure overlay mesh network called Nebula. We conduct a case study by provisioning an experimental system to evaluate Nebula in four key areas: reliability, security, manageability, and performance. We discuss the strengths of Nebula and its limitations for securing inter-service communication in distributed cloud applications. In terms of reliability, the thesis shows that Nebula falls short to meet its own goals of achieving host-to-host connectivity when attempting to traverse specific firewalls and NATs. With respect to security, Nebula provides certificate-based authentication and uses current and fast cryptographic algorithms and protocols from the Noise framework. Regarding manageability, Nebula is a modern solution with a loosely coupled design that allows scalability with cloud-ready features and easier deployment than IPsec. Finally, the performance of Nebula clearly shows an overhead for being a user-space software application. However, the overhead can be considered acceptable in certain server-to-server microservice interactions and is a fair trade-off for its ease of management in comparison to IPsec.
Med framväxten av molninbyggda applikationer skapar behovet av säkra nätverk och tjänster nya krav på automatisering, hanterbarhet och skalbarhet över datacenter. Flera lösningar har utvecklats för att övervinna begränsningarna i den konventionella och väletablerade IPsec-sviten som en säker tunnellösning. En strategi för att möta dessa nya krav har varit utformningen av mjukvarubaserade överläggsnätverk. I den här avhandlingen bedömer vi implementeringen av en traditionell IPsec VPN-lösning mot ett nytt säkert överläggsmeshnätverk som kallas Nebula. Vi genomför en fallstudie genom att bygga upp ett ett experimentellt system för att utvärdera Nebula inom fyra nyckelområden: tillförlitlighet, säkerhet, hanterbarhet och prestanda. Vi diskuterar styrkan i Nebula och dess begränsningar för att säkra kommunikation mellan tjänster i distribuerade molnapplikationer. När det gäller tillförlitlighet visar avhandlingen att Nebula inte uppfyller sina egna mål om att uppnå värd-tillvärd- anslutning när man försöker korsa specifika brandväggar och NAT. När det gäller säkerhet tillhandahåller Nebula certifikatbaserad autentisering och använder aktuella och snabba kryptografiska algoritmer och protokoll från Noise-ramverket. När det gäller hanterbarhet är Nebula en modern lösning med en löst kopplad design som möjliggör skalbarhet med molnklara funktioner och enklare distribution än IPsec. Slutligen visar prestandan hos Nebula tydligt en overhead för att vara en användarutrymme-programvara. Dock kan kostnaderna anses vara acceptabla i vissa server-till-server-mikroserviceinteraktioner och är en rättvis avvägning om vi tar i betraktande dess enkla hantering jämfört med IPsec.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Fressancourt, Antoine. "Conception et mise en oeuvre d'overlays réseau dynamiques pour la résilience du Cloud : Vers une flexibilité et une résilience accrue du Cloud Computing". Electronic Thesis or Diss., Paris, ENST, 2016. https://pastel.hal.science/tel-03690026.

Texto completo da fonte
Resumo:
Aujourd’hui, les services Internet ainsi que les applications de l’informatique en nuage, ou “Cloud Computing”, sont hébergés au sein de grands centres de calculs et de stockage (datacenters). Les opérateurs de services “Cloud” (ou Cloud ServiceProvider (CSP)) s’engagent à fournir à leurs clients un haut niveau de disponibilité de leurs infrastructures et de fiabilité des données traitées. A cette fin, la duplication des applications et des données clients les plus massives peuvent-être amenées à se faire dans des datacenters distants. Du point de vue des CSPs, garantir un haut niveau de résilience doit se faire au moindre coût, tant en termes d’investissements matériel que de coûts opérationnels. L’opération coordonnée des services “Cloud” répartis sur plusieurs datacenters distants nécessite une connectivité performante et résistante aux pannes entre ces sites. A ce titre, la plupart des CSPs mettent en place un maillage de connections redondées à usage privatif louées auprès des fournisseurs de services Internet. A priori, un tel schéma de connectivité est coûteux, peu flexible, le délai d’inclusion d’un nouveau datacenter dans le maillage souhaité pouvant s’avérer prohibitif du point de vue de l’utilisateur final. L’objectif de cette thèse est donc d’assurer la résilience des connections inter-datacenter au moyen d’une approche qui soit à la fois suffisamment dynamique et d’un coût de mise en œuvre inférieur à la constitution d’un maillage de lignes louées auprès des opérateurs. Dans cette démarche, nous nous appuyons sur le fait que les datacenters sont souvent connectés par le biais de plusieurs opérateurs à Internet. Nous définissons alors une architecture réseau superposée (overlay), que nous désignons par "Kumori" (le terme Kumori signifie "nuageux" en japonais) permettant de détecter et de réagir rapidement à des pannes de liens ou de nuds sur Internet entre différents datacenters. Cet overlay se compose de points d’inflexion de routage placés en coïncidence avec des IXPs (Internet Exchange Points). L’architecture Kumori est supposée être supervisée par un contrôleur centralisé. Une fois l’architecture Kumori définie, nous cherchons à en évaluer les caractéristiques en termes de performance et de résilience dans un contexte le plus réaliste possible. Dans un premier temps, nous comparons les performances de l’architecture Kumori à celles de l’architecture RON (Resilient Overlay Network), une autre architecture visant à améliorer la résilience des connexions sur Internet. Nous cherchons ensuite à déterminer le gain en termes de résilience obtenu grâce à l’architecture Kumori vis-à-vis de l’architecture RON en évaluant le nombre de chemins divers pouvant être établis entre les datacenters de deux grands opérateurs de services“Cloud”: Amazon et Atos. A cette fin, nous constituons une représentation d’Internet sous forme d’un graphe orienté à partir de trois jeux de données publics. Les nuds de ce graphe représentent les points de présence géographiques des différents réseaux opérateurs sur Internet. Cela nous permet de prendre en compte les différences de taille entre ces réseaux. L’un des challenges les plus importants que nous avons rencontré lors de cette évaluation est lié à la taille très importante du graphe que nous avons manipulé et à la complexité algorithmique de la recherche de chemins disjoints que nous avons réalisée. Enfin, nous présentons une évaluation économique du coût d’opération de l’architecture Kumori afin d’en évaluer la pertinence économique
Nowadays, Internet services as well as applications delivered using Cloud Computing are hosted in large datacenters. The Cloud Service Providers (CSP) commit to give to their customers access to their infrastructures with a high level of availability. They also target a high level of reliability of the data processed in their computing infrastructure. In order to respect those commitments, CSPs replicate the applications they run and the associated data in remote datacenters. From a CSP’s perspective, ensuring a high level of availability and reliability must be achieved while keeping the operational and capital expenditures as limited as possible. The coordinated operation of cloud applications from a set of remote datacenters requires using a performant and resilient connection scheme. In that extend, most CSPs deploy a mesh of private protected links rented from Internet service providers between their datacenters. A priori, such a connection scheme is costly and poorly flexible. Besides,from a CSP’s point of view, including a new datacenter in the desired network is an expensive approach. The goal of this PhD thesis is to allow CSPs to ensure their datacenter interconnections’ resiliency using a flexible and affordable connection scheme. In that extend, we take advantage of the fact that datacenters are most of the time connected to the Internet through several Internet service providers. We design an overlay network architecture, referred as Kumori. Kumori stands for "cloudy" in Japanese. This architecture aims to detect and to react quickly to link or node failures affecting inter-datacenter communications over the Internet. This overlay consists in routing inflection points placed at Internet Exchange Points (IXP). The Kumori architecture is managed by a central controller. After the description of the Kumori architecture, we evaluate its characteristics in terms of performance and resiliency. First, we compare Kumori’s performance to the performance achieved by RON (Resilient Overlay Network), another overlay network architecture aiming at enhancing resiliency over the Internet. We then, characterize the resiliency benefits provided by the Kumori architecture. To do so, we evaluate the number of disjoint paths that it can establish between the datacenters of two CSPs: Atos and Amazon. For the sake of this evaluation, we build a directed graph representation of the Internet using three public data sources in which the graph nodes represent the various operators’ geographical points of presence (PoP). Our Internet representation allows us to take into account the differences between network operators in the Internet. One of the major challenges we faced during this evaluation is related to the very large size of the graph we obtained, and to the algorithmic complexity of the path diversity search algorithm. At last, we discuss an evaluation of Kumori’s costs of operation in order to evaluate the economical potential of this architecture
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Khan, Imran. "Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019/document.

Texto completo da fonte
Resumo:
Des Réseaux de Capteurs Sans Fil (RdCSF) deviennent omniprésents et sont utilisés dans diverses applications domaines. Ils sont les pierres angulaires de l'émergence de l'Internet des Objets (IdO) paradigme. Déploiements traditionnels de réseaux de capteurs sont spécifiques à un domaine, avec des applications généralement incrustés dans le RdCSF, excluant la ré-utilisation de l'infrastructure par d'autres applications. Maintenant, avec l'avènement de l'IdO, cette approche est de moins en moins viable. Une solution possible réside dans le partage d'une même RdCSF par de plusieurs applications et services, y compris même les applications et services qui ne sont pas envisagées lors du déploiement de RdCSF. Deux principaux développements majeurs ont conduit à cette solution potentielle. Premièrement, comme les nœuds de RdCSF sont de plus en plus puissants, il devient de plus en plus pertinent de rechercher comment pourrait plusieurs applications partager les mêmes déploiements WSN. La deuxième évolution est le Cloud Computing paradigme qui promeut des ressources et de la rentabilité en appliquant le concept de virtualisation les ressources physiques disponibles. Grâce à ces développements de cette thèse fait les contributions suivantes. Tout d'abord, un vaste état de la revue d'art est présenté qui présente les principes de base de RdCSF la virtualisation et sa pertinence avec précaution motive les scénarios sélectionnés. Les travaux existants sont présentés en détail et évaluées de manière critique en utilisant un ensemble d'exigences provenant du scénario. Cette contribution améliore sensiblement les critiques actuelles sur l'état de l'art en termes de portée, de la motivation, de détails, et les questions de recherche futures. La deuxième contribution se compose de deux parties: la première partie est une nouvelle architecture de virtualization RdCSF multicouche permet l'approvisionnement de plusieurs applications et services au cours du même déploiement de RdCSF. Il est mis en œuvre et évaluée en utilisant un prototype basé sur un scénario de preuve de concept en utilisant le kit Java SunSpot. La deuxième partie de cette contribution est l'architecture étendue qui permet à l’infrastructure virtualisée RdCSF d'interagir avec un RdCSF Platform-as-a-Service (PaaS) à un niveau d'abstraction plus élevé. Grâce à ces améliorations RdCSF PaaS peut provisionner des applications et des services RdCSF aux utilisateurs finaux que Software-as-a-Service (SaaS). Les premiers résultats sont présentés sur la base de l'implantation de l'architecture améliorée en utilisant le kit Java SunSpot. La troisième contribution est une nouvelle architecture d'annotation de données pour les applications sémantiques dans les environnements virtualisés les RdCSF. Il permet en réseau annotation de données et utilise des superpositions étant la pierre angulaire. Nous utilisons la base ontologie de domaine indépendant d'annoter les données du capteur. Un prototype de preuve de concept, basé sur un scénario, est développé et mis en œuvre en utilisant Java SunSpot, Kits AdvanticSys et Google App Engine. La quatrième et dernière contribution est l'amélioration à l'annotation de données proposée l'architecture sur deux fronts. L'un est l'extension à l'architecture proposée pour soutenir la création d'ontologie, de la distribution et la gestion. Le deuxième front est une heuristique génétique basée algorithme utilisé pour la sélection de noeuds capables de stocker l'ontologie de base. L'extension de la gestion d'ontologie est mise en oeuvre et évaluée à l'aide d'un prototype de validation de principe à l'aide de Java kit SunSpot, tandis que les résultats de la simulation de l'algorithme sont présentés
Wireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Khan, Imran. "Cloud-based cost-efficient application and service provisioning in virtualized wireless sensor networks". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0019.

Texto completo da fonte
Resumo:
Des Réseaux de Capteurs Sans Fil (RdCSF) deviennent omniprésents et sont utilisés dans diverses applications domaines. Ils sont les pierres angulaires de l'émergence de l'Internet des Objets (IdO) paradigme. Déploiements traditionnels de réseaux de capteurs sont spécifiques à un domaine, avec des applications généralement incrustés dans le RdCSF, excluant la ré-utilisation de l'infrastructure par d'autres applications. Maintenant, avec l'avènement de l'IdO, cette approche est de moins en moins viable. Une solution possible réside dans le partage d'une même RdCSF par de plusieurs applications et services, y compris même les applications et services qui ne sont pas envisagées lors du déploiement de RdCSF. Deux principaux développements majeurs ont conduit à cette solution potentielle. Premièrement, comme les nœuds de RdCSF sont de plus en plus puissants, il devient de plus en plus pertinent de rechercher comment pourrait plusieurs applications partager les mêmes déploiements WSN. La deuxième évolution est le Cloud Computing paradigme qui promeut des ressources et de la rentabilité en appliquant le concept de virtualisation les ressources physiques disponibles. Grâce à ces développements de cette thèse fait les contributions suivantes. Tout d'abord, un vaste état de la revue d'art est présenté qui présente les principes de base de RdCSF la virtualisation et sa pertinence avec précaution motive les scénarios sélectionnés. Les travaux existants sont présentés en détail et évaluées de manière critique en utilisant un ensemble d'exigences provenant du scénario. Cette contribution améliore sensiblement les critiques actuelles sur l'état de l'art en termes de portée, de la motivation, de détails, et les questions de recherche futures. La deuxième contribution se compose de deux parties: la première partie est une nouvelle architecture de virtualization RdCSF multicouche permet l'approvisionnement de plusieurs applications et services au cours du même déploiement de RdCSF. Il est mis en œuvre et évaluée en utilisant un prototype basé sur un scénario de preuve de concept en utilisant le kit Java SunSpot. La deuxième partie de cette contribution est l'architecture étendue qui permet à l’infrastructure virtualisée RdCSF d'interagir avec un RdCSF Platform-as-a-Service (PaaS) à un niveau d'abstraction plus élevé. Grâce à ces améliorations RdCSF PaaS peut provisionner des applications et des services RdCSF aux utilisateurs finaux que Software-as-a-Service (SaaS). Les premiers résultats sont présentés sur la base de l'implantation de l'architecture améliorée en utilisant le kit Java SunSpot. La troisième contribution est une nouvelle architecture d'annotation de données pour les applications sémantiques dans les environnements virtualisés les RdCSF. Il permet en réseau annotation de données et utilise des superpositions étant la pierre angulaire. Nous utilisons la base ontologie de domaine indépendant d'annoter les données du capteur. Un prototype de preuve de concept, basé sur un scénario, est développé et mis en œuvre en utilisant Java SunSpot, Kits AdvanticSys et Google App Engine. La quatrième et dernière contribution est l'amélioration à l'annotation de données proposée l'architecture sur deux fronts. L'un est l'extension à l'architecture proposée pour soutenir la création d'ontologie, de la distribution et la gestion. Le deuxième front est une heuristique génétique basée algorithme utilisé pour la sélection de noeuds capables de stocker l'ontologie de base. L'extension de la gestion d'ontologie est mise en oeuvre et évaluée à l'aide d'un prototype de validation de principe à l'aide de Java kit SunSpot, tandis que les résultats de la simulation de l'algorithme sont présentés
Wireless Sensor Networks (WSNs) are becoming ubiquitous and are used in diverse applications domains. Traditional deployments of WSNs are domain-specific, with applications usually embedded in the WSN, precluding the re-use of the infrastructure by other applications. This can lead to redundant deployments. Now with the advent of IoT, this approach is less and less viable. A potential solution lies in the sharing of a same WSN by multiple applications and services, to allow resource- and cost-efficiency. In this dissertation, three architectural solutions are proposed for this purpose. The first solution consists of two parts: the first part is a novel multilayer WSN virtualization architecture that allows the provisioning of multiple applications and services over the same WSN deployment. The second part of this contribution is the extended architecture that allows virtualized WSN infrastructure to interact with a WSN Platform-as-a-Service (PaaS) at a higher level of abstraction. Both these solutions are implemented and evaluated using two scenario-based proof-of-concept prototypes using Java SunSpot kit. The second architectural solution is a novel data annotation architecture for the provisioning of semantic applications in virtualized WSNs. It is capable of providing in-network, distributed, real-time annotation of raw sensor data and uses overlays as the cornerstone. This architecture is implemented and evaluated using Java SunSpot, AdvanticSys kits and Google App Engine. The third architectural solution is the enhancement to the data annotation architecture on two fronts. One is a heuristic-based genetic algorithm used for the selection of capable nodes for storing the base ontology. The second front is the extension to the proposed architecture to support ontology creation, distribution and management. The simulation results of the algorithm are presented and the ontology management extension is implemented and evaluated using a proof-of-concept prototype using Java SunSpot kit. As another contribution, an extensive state-of-the-art review is presented that introduces the basics of WSN virtualization and motivates its pertinence with carefully selected scenarios. This contribution substantially improves current state-of-the-art reviews in terms of the scope, motivation, details, and future research issues
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

"FADE: secure overlay cloud storage with access control and file assured deletion". 2011. http://library.cuhk.edu.hk/record=b5894616.

Texto completo da fonte
Resumo:
Tang, Yang.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (p. 60-65).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Policy-based File Assured Deletion --- p.7
Chapter 2.1 --- Background --- p.7
Chapter 2.2 --- Policy-based Deletion --- p.9
Chapter 3 --- Basic Design of FADE --- p.13
Chapter 3.1 --- Entities --- p.13
Chapter 3.2 --- Deployment --- p.15
Chapter 3.3 --- "Security Goals, Threat Models, and Assumptions" --- p.16
Chapter 3.4 --- The Basics - File Upload/Download --- p.18
Chapter 3.5 --- Policy Revocation for File Assured Deletion --- p.23
Chapter 3.6 --- Multiple Policies --- p.23
Chapter 3.7 --- Policy Renewal --- p.25
Chapter 4 --- Extensions of FADE --- p.27
Chapter 4.1 --- Access Control with ABE --- p.27
Chapter 4.2 --- Multiple Key Managers --- p.31
Chapter 5 --- Implementation --- p.35
Chapter 5.1 --- Representation of Metadata --- p.36
Chapter 5.2 --- Client --- p.37
Chapter 5.3 --- Key Managers --- p.38
Chapter 6 --- Evaluation --- p.40
Chapter 6.1 --- Experimental Results on Time Performance of FADE --- p.41
Chapter 6.1.1 --- Evaluation of Basic Design --- p.42
Chapter 6.1.2 --- Evaluation of Extensions --- p.46
Chapter 6.2 --- Space Utilization of FADE --- p.49
Chapter 6.3 --- Cost Model --- p.51
Chapter 6.4 --- Lessons Learned --- p.53
Chapter 7 --- Related Work --- p.54
Chapter 8 --- Conclusions --- p.58
Bibliography --- p.60
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Cloud overlay networks"

1

Toy, Mehmet. Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing. Springer International Publishing AG, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Falco, Gregory J., e Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.

Texto completo da fonte
Resumo:
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization’s overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident’s potential impact on overall operations. In a world of hackers, artificial intelligence, and persistent ransomware attacks, the Embedded Endurance strategy embraces the reality of interdependent digital assets and provides an approach that addresses cyber risk at both the micro level (people, networks, systems and data) and the macro level (the organization). Most books about cybersecurity focus entirely on technology; the Embedded Endurance strategy recognizes the need for sophisticated thinking about hardware and software while also extending beyond to address operational, reputational and litigation risk. This book both provides the reader with a solid grounding in important prevention-focused technologies—such as cloud-based security and intrusion detection—and emphasizes the important role of incident response. By implementing an Embedded Endurance strategy, you can guide your team to blunt major cyber incidents with preventative and resilience measures engaged systematically across your organization.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Cloud overlay networks"

1

Walkowiak, Krzysztof. "Overlay Networks". In Modeling and Optimization of Cloud-Ready and Content-Oriented Networks, 195–255. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30309-3_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Sitaraman, Ramesh K., Mangesh Kasbekar, Woody Lichtenstein e Manish Jain. "Overlay Networks: An Akamai Perspective". In Advanced Content Delivery, Streaming, and Cloud Services, 305–28. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781118909690.ch16.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Matos, Miguel, António Sousa, José Pereira, Rui Oliveira, Eric Deliot e Paul Murray. "CLON: Overlay Networks and Gossip Protocols for Cloud Environments". In On the Move to Meaningful Internet Systems: OTM 2009, 549–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05148-7_41.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Aljaedi, Amer, C. Edward Chow e Jia Rao. "Elastic Edge-Overlay Methods Using OpenFlow for Cloud Networks". In Advances in Intelligent Systems and Computing, 25–37. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32467-8_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zhang, Lei, e Le Chen. "Constructing a Logical Network (Overlay Network) in a DC". In Cloud Data Center Network Architectures and Technologies, 175–210. First edition. | Boca Raton : CRC Press, 2021. | Summary: “This book has: CRC Press, 2021. http://dx.doi.org/10.1201/9781003143185-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Al-Asfoor, Muntasir, e Mohammed Hamzah Abed. "The Effect of the Topology Adaptation on Search Performance in Overlay Network". In Expert Clouds and Applications, 65–73. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2126-0_7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Liu, Qian, Juan Gu, Jingchao Yang, Yun Li, Dexuan Sha, Mengchao Xu, Ishan Shams, Manzhu Yu e Chaowei Yang. "Cloud, Edge, and Mobile Computing for Smart Cities". In Urban Informatics, 757–95. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8983-6_41.

Texto completo da fonte
Resumo:
AbstractSmart cities evolve rapidly along with the technical advances in wireless and sensor networks, information science, and human–computer interactions. Urban computing provides the processing power to enable the integration of such technologies to improve the living quality of urban citizens, including health care, urban planning, energy, and other aspects. This chapter uses different computing capabilities, such as cloud computing, mobile computing, and edge computing, to support smart cities using the urban heat island of the greater Washington DC area as an example. We discuss the benefits of leveraging cloud, mobile, and edge computing to address the challenges brought by the spatiotemporal dynamics of the urban heat island, including elevated emissions of air pollutants and greenhouse gases, compromised human health and comfort, and impaired water quality. Cloud computing brings scalability and on-demand computing capacity to urban system simulations for timely prediction. Mobile computing brings portability and social interactivity for citizens to report instantaneous information for better knowledge integration. Edge computing allows data produced by in-situ devices to be processed and analyzed at the edge of the network, reducing the data traffic to the central repository and processing engine (data center or cloud). Challenges and future directions are discussed for integrating the three computing technologies to achieve an overall better computing infrastructure supporting smart cities. The integration is discussed in aspects of bandwidth issue, network access optimization, service quality and convergence, and data integrity and security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Khurram, Shahzada, e Osman Ghazali. "Design and Development of VXLAN Based Cloud Overlay Network Monitoring System and Environment". In Advances in Intelligent Systems and Computing, 141–47. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77028-4_22.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Li, Xiang, Jianwen Sun, Chung-Ming Own e Wenyuan Tao. "Gaussian Mixture Model-Based Registration Network for Point Clouds with Partial Overlap". In Lecture Notes in Computer Science, 405–16. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15934-3_34.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Rao, Voore Subba, e K. Srinivas. "Reduce Overall Execution Cost (OEC) of Computation Offloading in Mobile Cloud Computing for 5G Network Using Nature Inspired Computing (NIC) Algorithms". In Mobile Radio Communications and 5G Networks, 679–90. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-7018-3_51.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Cloud overlay networks"

1

Cai, Chris X., Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom e Roy H. Campbell. "CRONets: Cloud-Routed Overlay Networks". In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2016. http://dx.doi.org/10.1109/icdcs.2016.49.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Mercan, Suat. "Cloud Assisted Overlay Routing". In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2018. http://dx.doi.org/10.1109/icufn.2018.8436951.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Tammineni, Lavanya, e Mina Guirguis. "Toward local overlay-based Mobile Clouds". In 2016 3rd Smart Cloud Networks & Systems (SCNS). IEEE, 2016. http://dx.doi.org/10.1109/scns.2016.7870556.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Machado, Guilherme Sperb, Thomas Bocek, Michael Ammann e Burkhard Stiller. "A Cloud Storage overlay to aggregate heterogeneous Cloud services". In 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). IEEE, 2013. http://dx.doi.org/10.1109/lcn.2013.6761296.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Alliche, Redha A., Tiago Da Silva Barros, Ramon Aparicio-Pardo e Lucile Sassatelli. "prisma-v2: Extension to Cloud Overlay Networks". In 2023 23rd International Conference on Transparent Optical Networks (ICTON). IEEE, 2023. http://dx.doi.org/10.1109/icton59386.2023.10207272.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Choochotkaew, Sunyanan, Tatsuhiro Chiba, Scott Trent e Marcelo Amaral. "Bypass Container Overlay Networks with Transparent BPF-driven Socket Replacement". In 2022 IEEE 15th International Conference on Cloud Computing (CLOUD). IEEE, 2022. http://dx.doi.org/10.1109/cloud55607.2022.00033.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Trifa, Zied, e Maher Khemakhem. "Securing Structured P2P Overlay Networks". In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE, 2013. http://dx.doi.org/10.1109/3pgcic.2013.13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Tato, Genc, Marin Bertier e Cedric Tedeschi. "Designing Overlay Networks for Decentralized Clouds". In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2017. http://dx.doi.org/10.1109/cloudcom.2017.64.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kuo, Jian-Jhih, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai e Wen-Tsuen Chen. "Service Overlay Forest Embedding for Software-Defined Cloud Networks". In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017. http://dx.doi.org/10.1109/icdcs.2017.62.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Beigi-Mohammadi, Nasim, Hamzeh Khazaei, Mark Shtern, Cornel Barna e Marin Litoiu. "Adaptive service management for cloud applications using overlay networks". In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2017. http://dx.doi.org/10.23919/inm.2017.7987302.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia