Abstract. Cloud computing is widely considered as an attractive service model since the users commitments for investment and operations are minimised, and costs are in direct relation to usage and demand. However, when networking aspects for distributed clouds are considered, there is little support and the effort is often underestimated. The project SAIL is addressing cloud networking as the combination of management for cloud computing and vital networking capabilities between distributed cloud resources involved to improve the management of both. This position paper presents new security challenges as considered in SAIL for ensuring legitimate usage of cloud networking resources and for preventing misuse.
With the popularization of cloud computing, several enterprises and open-source communities have developed their own cloud solutions. A number of factors weigh on user selection, as each one has peculiar characteristics and may target different usage scenarios. Considering such challenge, this paper focuses on giving the reader an understanding of some major existing open cloud computing solutions -XCP, Eucalyptus and OpenNebula. Hopefully, a deep comparison of such solutions can leverage the cloud computing research area providing a good starting point to research groups and interested readers.
This paper examines the issues encountered by network operators when content providers utilize peer-to-peer (P2P) technologies to distribute media. After outlining the various causes of the conflict a set of potential solutions are presented. BackgroundP2P technologies are increasingly being used for legal distribution of media content. The generated traffic consists of bandwidth intensive file downloads as well as video streams, examples include Joost [2] and BBC's iPlayer [1]. For fixed broadband network operators this traffic has brought about a set of problems. Managed operator networks are usually partitioned into at least two parts. One partition provides guaranteed quality of service used for running traffic of value added services such as IPTV and VoIP and a best effort partition with no service guarantees provides data transport for end user Internet traffic. The outstanding issue is the introduction of contention for bandwidth in the best effort class in the operators network between regular Internet traffic (e.g., web surfing, email) and P2P traffic. The fair usage of the best effort section of the network is hence disrupted as users of P2P applications tend to use up a disproportionately greater share of the available bandwidth. The fair usage issue arises primarily due to the way P2P applications are designed, namely their greedy behavior whereby tens of parallel TCP sessions are simultaneously opened to speed up content delivery. Problem analysis and solution space2.1. Tromboning effect DSL Ethernet based broadband access networks consist of an aggregation network and an edge node connected to the core network. The aggregation network is made up of L2 switches as this helps ensure low cost and simplicity. The end users are connected to the aggregation network by means of access nodes (e.g., DSLAMs) and the aggregation network is connected to the core by edge nodes which perform IP routing. A widely used policy in Ethernet access networks is to force all unicast and broadcast traffic via the aggregation network to the edge nodes where routing, policing and traffic shaping is performed. This is implemented with a technology like MAC-forced forwarding [5].This common sort of setup brings about a so-called tromboning effect. The result of this effect is that end user traffic destined to another end user connected to the same access node would first be forced up to the edge node via the aggregation network after which it returns back via the aggregation network to the recipient end user. Moreover, the traffic between end users in the same subnet but connected to different access nodes must also go through the edge node. In this setup the P2P traffic between two users connected to the same access network would hence be sent twice via the aggregation network which is clearly suboptimal. Peer proximity and cachingSolutions addressing P2P traffic have included peer proximity awareness. The peers that are in close proximity are encouraged to exchange content between each other rather than fetching it from mor...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.