Design of Peer-to-Peer Traffic Classification System Model Based on Cloud Computing

2012 ◽  
Vol 182-183 ◽  
pp. 1347-1351 ◽  
Author(s):  
Xi Zi Liu ◽  
Ya Bin Xu

The advantages and disadvantages of mainstream peer-to-peer (P2P) traffic classification technology in the current application are analyzed. As existing traffic classification tools fail to meet the super flow, as well as continuous increasing of network bandwidth, a cloud-based P2P traffic classification system model is proposed, which use the distributed parallel computing architecture named MapReduce based on hadoop.

Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Author(s):  
Xiangbing Zhao ◽  
Jianhui Zhou

With the advent of the computer network era, people like to think in deeper ways and methods. In addition, the power information network is facing the problem of information leakage. The research of power information network intrusion detection is helpful to prevent the intrusion and attack of bad factors, ensure the safety of information, and protect state secrets and personal privacy. In this paper, through the NRIDS model and network data analysis method, based on deep learning and cloud computing, the demand analysis of the real-time intrusion detection system for the power information network is carried out. The advantages and disadvantages of this kind of message capture mechanism are compared, and then a high-speed article capture mechanism is designed based on the DPDK research. Since cloud computing and power information networks are the most commonly used tools and ways for us to obtain information in our daily lives, our lives will be difficult to carry out without cloud computing and power information networks, so we must do a good job to ensure the security of network information network intrusion detection and defense measures.


2020 ◽  
Vol 19 ◽  

Fog computing is a promising technology that is used by many organizations and end-users. It has characteristics and advantages that offer services such as computing, storage, communication, and application services. It facilitates these services to end-users and allows to increase the number of devices that can connect to the network. In this paper, we provide a survey of Fog computing technology in terms of its architecture, features, advantages and disadvantages. We provide a comparison of this model with Cloud Computing, Mobile-Edge Computing, and Cloudlet Computing. We also present challenges and issues that face Fog Computing such as privacy and security, control and management, fog networking and task scheduling. Finally, we discuss aspects of Fog computing security and the benefits of integration between Fog computing and other techniques like Internet of Things and Cloud Computing.


Author(s):  
І. Андрущак ◽  
В. Марценюк ◽  
I. Андрощук ◽  
В. Чудовець ◽  
М. Потейчук

The article discusses the current state of application and development of cloud computing, the main advantages and disadvantages of their use in the states, enterprises and in scientific activity. The standards, regulations and guidance documents in the field of cloud computing information security are developed and analyzed, developed by the Cloud Security Alliance (CSA), the European Network and Information Security Agency (ENISA) and the National Institute of Standards and Technology (NIST), and the results of a detailed analysis of the issues information security in the cloud.


2012 ◽  
Vol 241-244 ◽  
pp. 1482-1486
Author(s):  
Jian Wen Zhao ◽  
Wei Xie

This paper mainly focuses on designing an open CNC system. At first, the advantages and disadvantages of the three popular open numerical control technologies were discussed, and on the basis of demands analysis, this paper chose motion controller plus PC as the whole system model. Then, according to the system model, this article designed the hardware system for the control system, including choosing multi-axis motion control card, servo motors and their drivers. Thirdly, based on the features of this open numerical control system, the paper designed and put the software into three levels, namely low level of control software, mid-level of communication software, and high-level of management software respectively. Finally, in order to test the control performance of this open numerical control system, some experiments were carried out on a two-dimension motion platform, the results are satisfactory and error analysis on these experiments is also given out.


2014 ◽  
Vol 543-547 ◽  
pp. 3573-3576
Author(s):  
Yuan Jun Zou

Cloud computing, networking and other high-end computer data processing technology are the important contents of eleven-five development planning in China. They have developed rapidly in recent years in the field of engineering. In this paper, we combine parallel computing with the collaborative simulation principle, design a cloud computing platform, establish the mathematical model of cloud data processing and parallel computing algorithm, and verify the applicability of algorithm through the numerical simulation. Through numerical calculation, cloud computing platform can be divided into complex grids, and the transmission speed is fast, which is eight times than the finite difference method. The mesh is meticulous, which reaches millions. Convergence error is minimum, only 0.001. The calculation accuracy is up to 98.36%.


Sign in / Sign up

Export Citation Format

Share Document