Survey on Traffic Redundancy and Elimination Approach for Reducing Cloud Bandwidth and Costs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 2
Abstract
Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the internet and users can access resources on based on their payments. Transmission cost plays an important role when trying to minimize cloud cost. However for server specific TRE approach it is difficult to handle the traffic efficiently and it doesn’t suites for the cloud environment because of high processing costs. In this paper we give a survey on the new traffic redundancy technique known as novel-TRE also known as receiver based TRE. This novel-TRE has significant features like detecting the redundancy at the client, repeats appear in chains, matches incoming chunks with a previously received chunk chain or local file and sending to the server for predicting the future data and no need of server to continuously maintain client state.
Authors and Affiliations
Suresh Chougala , Sharavana K
A Scenario of Brain Computer Interaction with Different types of Face Recognition Techniques
Brain computer interaction technology has been developed to record the brain signal activity through various methods like Digital Electroencephalography, EMG , FMRI and face recognition. These are the advanced technology...
Development of energy efficient routing protocol using Hop PEGASIS in Wireless Sensor Networks
In a Wireless sensor network (WSN), communication of the gathered data in the network from the nodes to the base station is a prominent activity and this communication of data consumes the maximum amount of energy. When...
Human-Computer Interaction: Preamble and Future in 2020.
The growth in Human-Computer Interaction (HCI) field has not only been in quality of interaction, it has also experienced different branching in its history. The intention behind writing this paper is to provide an overv...
Secure Routing Using ASOR Protocol for MANETs
Privacy protection is one of the critical issues in Mobile Adhoc Networks. To provide unobservability and unlinkability on the network was the major requirements. Although ,there was number of secure protocols available...
Mobility Based Tree Construction for ZigBee Wireless Networks
ZigBee is a specification for wireless personal area networks with low power, low cost, and a low data rate. It’s defined by IEEE 802.15.4 standard. In ZigBee wireless network, tree topology is commonly practiced to form...