scholarly journals Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud

2020 ◽  
Vol 18 (4) ◽  
pp. 761-778 ◽  
Author(s):  
Gabriele Pierantoni ◽  
Tamas Kiss ◽  
Gabor Terstyanszky ◽  
James DesLauriers ◽  
Gregoire Gesmier ◽  
...  

AbstractTypical cloud applications require high-level policy driven orchestration to achieve efficient resource utilisation and robust security to support different types of users and user scenarios. However, the efficient and secure utilisation of cloud resources to run applications is not trivial. Although there have been several efforts to support the coordinated deployment, and to a smaller extent the run-time orchestration of applications in the Cloud, no comprehensive solution has emerged until now that successfully leverages applications in an efficient, secure and seamless way. One of the major challenges is how to specify and manage Quality of Service (QoS) properties governing cloud applications. The solution to address these challenges could be a generic and pluggable framework that supports the optimal and secure deployment and run-time orchestration of applications in the Cloud. A specific aspect of such a cloud orchestration framework is the need to describe complex applications incorporating several services. These application descriptions must specify both the structure of the application and its QoS parameters, such as desired performance, economic viability and security. This paper proposes a cloud technology agnostic approach to application descriptions based on existing standards and describes how these application descriptions can be processed to manage applications in the Cloud.

T-Comm ◽  
2020 ◽  
Vol 14 (10) ◽  
pp. 33-38
Author(s):  
Alexander S. Antonenko ◽  
◽  
Andrey N. Zemtsov ◽  

This article describes the IPTV system, as well as its implementation methods and related protocols. The concept of IPTV includes both real-time television and recording television, the so-called VoD. In real time, streaming data is sent using only the RTP protocol and in addition to it, the RTSP protocol is used for streaming VoD. In addition, methods for measuring QoS parameters are analyzed, considering practical applications for estimating IPTV traffic parameters. An important feature of providing quality IPTV services is a high level of quality of service. Also, in theory, an Internet connection model with insufficient network bandwidth is considered. The following characteristics are taken into account: bandwidth, one-way delay, inter-packet jitter, the number of lost packets, the number of duplicated packets, packets with errors, and damaged packets. A reordering issue is mentioned. In addition, two important QoS parameters for VoD are measured: START delay and PAUSE / RESUME delays. Service messaging is considered while providing IPTV service. The maximum, average, and minimum values for the network quality of service parameters are found.


2019 ◽  
Vol 8 (4) ◽  
pp. 4522-4525

Wireless networks are classified into different types of networks namely infrastructure and infrastructure less networks. In infrastructure less network Vehicular adhoc network is an energy oriented multibroadcating network, nowadays due to the rapid growth and development in the automobile sector many accidents are occurring during driving a vehicle. In simulation environment various protocols are designed to monitor the network performance and to increase the network performance, in our proposed method we designed a new protocol named cluster based VANET routing protocol (CBVRP) to increase the network performance and to reduce the energy consumption. The protocol aims to minimize the energy consumption to increase the lifetime of the network and increasing the quality of service parameters like packet delivery ratio, reducing delay, reducing normalized routing overhead and increasing efficiency. The results shows that the proposed protocol improves the quality of service parameters and it consumes less energy compared with an existing protocol.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


Author(s):  
Simar Preet Singh ◽  
Rajesh Kumar ◽  
Anju Sharma ◽  
S. Raji Reddy ◽  
Priyanka Vashisht

Background: Fog computing paradigm has recently emerged and gained higher attention in present era of Internet of Things. The growth of large number of devices all around, leads to the situation of flow of packets everywhere on the Internet. To overcome this situation and to provide computations at network edge, fog computing is the need of present time that enhances traffic management and avoids critical situations of jam, congestion etc. Methods: For research purposes, there are many methods to implement the scenarios of fog computing i.e. real-time implementation, implementation using emulators, implementation using simulators etc. The present study aims to describe the various simulation and emulation tools for implementing fog computing scenarios. Results: Review shows that iFogSim is the simulator that most of the researchers use in their research work. Among emulators, EmuFog is being used at higher pace than other available emulators. This might be due to ease of implementation and user-friendly nature of these tools and language these tools are based upon. The use of such tools enhance better research experience and leads to improved quality of service parameters (like bandwidth, network, security etc.). Conclusion: There are many fog computing simulators/emulators based on many different platforms that uses different programming languages. The paper concludes that the two main simulation and emulation tools in the area of fog computing are iFogSim and EmuFog. Accessibility of these simulation/emulation tools enhance better research experience and leads to improved quality of service parameters along with the ease of their usage.


Author(s):  
M'hamed Outanoute ◽  
Hamid Garmani ◽  
Mohamed Baslam ◽  
Rachid El Ayachi ◽  
Belaid Bouikhalene

In internet market, content providers (CPs) continue to play a primordial role in the process of accessing different types of data. Competition in this area is fierce; customers are looking for providers that offer them good content (credibility of content and quality of service) with a reasonable price. In this work, the authors analyze this competition between CPs and the economic influence of their strategies on the market. The authors formulate their problem as a non-cooperative game among multiple CPs for the same market. Through a detailed analysis, the researchers prove uniqueness of a pure Nash Equilibrium (NE). Furthermore, a fully distributed algorithm to converge on the NE point is presented. In order to quantify how efficient the NE point is, a detailed analysis of the Price of Anarchy (PoA) is adopted to ensure the performance of the system at equilibrium. Finally, an extensive numerical study is provided to describe the interactions between CPs and to point out the importance of quality of service (QoS) and credibility of content in the market.


Sign in / Sign up

Export Citation Format

Share Document