Figure - available from: Multimedia Tools and Applications
This content is subject to copyright. Terms and conditions apply.
The basic architecture of a desktop virtualization system with PRTS

The basic architecture of a desktop virtualization system with PRTS

Source publication
Article
Full-text available
As a solution for cloud computing, desktop virtualization realizes the remote execution of applications and feeds back execution results in the form of ”screen updates” through network, aiming to offer users the same experience as operating in local systems. It is challenging to achieve this goal since timeliness and reliability should be both guar...

Citations

... The scheme comparison is carried out, and in the paper [33], the same author does compare the RDP with the ICA protocol. Studies have shown that these common cloud desktop protocols each have their own areas of adaptation, but most of the research is not based on real scene environments, and most of the research work is based on some simulation verification platforms, such as NetEm [34], and other simulation environment tools with certain random packet loss and link delay. ...
Article
Full-text available
Cloud desktop represents an outstanding product in the domain of cloud computing, which refers to the desktop cloud, desktop virtualization and virtual desktop. Cloud desktop explores the virtualization technology to concentrate computing resources, which delivers traditional computer desktops (operating system interfaces) or applications deployed in the pooled computing resources to polymorphic terminals through the Internet. As a distinctive product of cloud computing, cloud desktop has been a hot topic since its inception. Today, the virtualized resource pool of cloud computing achieves the elastic and dynamic expansion of resources, which brings the desktop system from an independent personal computer to a centralized physical server. Consequently, the great improvement in basic network conditions makes it possible to transmit high-quality desktops over the network. There are two key factors for cloud desktops, one of which is the virtualization technology on the server side and the other one, which is the transmission protocol of cloud desktops. The cloud desktop transmission protocol mainly completes the transmission of graphics, images and audio from the server to the user terminal. The transmission of input information from the user terminal, called DaaS (Desktop-as-a-Service), includes the input information of peripherals such as a mouse, keyboard, printer and so on. The efficiency of the transmission protocol determines the basic delivery capability of the cloud desktop, while the bearer protocol and graphics and image processing methods in the transmission protocol determine the interactive experience of the cloud desktop. Different protocols have their characteristics and applicable space. This paper spies on application and transport layer communication protocols to meet DaaS communication requirements. This paper describes the internal mechanism of various transport protocols applicable to a cloud desktop from the principle level and points out the pros and cons and the current application environment. It can be seen that these methods solve the transmission efficiency of burst traffic, improve user experience and reduce bandwidth consumption, which are the development direction of transmission protocols.
... The problem with this proposal is that there is not a direct mapping between the service and the network metrics. Conversely, Hongdi Zheng et al. [40] used the time between screen updates to evaluate the QoE of users in different transmission schemes for desktop virtualization environments, with a low frequency being indicative of a worse user experience. However, the time between screen updates is not compared with user's actions within the system. ...
Article
Full-text available
The growing trend of desktop virtualisation has facilitated the reduction of management costs associated with traditional systems and access to services from devices with different capabilities. However, desktop virtualisation requires controlling the interactivity provided by an infrastructure and the quality of experience perceived by users. This paper proposes a methodology for the quantification of interactivity based on the measurement of the time elapsed between user interactions and the associated responses. Measurement error is controlled using a novel mechanism for the detection of screen changes, which can lead to erroneous measurements. Finally, a campus virtual desktop infrastructure and the Amazon WorkSpaces solution are analysed using this proposed methodology. The results demonstrate the importance of the location of virtualisation infrastructure and the types of protocols used by remote desktop services.
... These queues for eight user data priorities (UP) presented in IEEE802.1D standard, declared in Fig.3 High AC priority has small window size which make frame belonging to this AC being transmitted before other frames related to different AC which has larger window size [22]. ...
Article
Full-text available
IEEE 802.11x Wireless Local-Area-Network (WLAN) considered a powerful solution for the last mile wireless broadband (BB) access. WLAN becomes important element in 4G and 5G mobile networks because it can provide services to mobile users in areas not covered by eNBs. However, the 802.11 legacy protocol doesn't support delay-sensitive services like VoIP because it adopts the best-effort method. In 2001 IEEE 802.11e standard was proposed to deploy QoS with new access techniques introduction. There are many parameters related to MAC layer which affect the WLAN network performance from the prospective of delay, and throughput. This study presents performance evaluation of voice traffic and FTP traffic in IEEE802.11 legacy protocol WLAN and IEEE802.11e WLAN via OPNET computer simulation. Network performance will be tested against different MAC access protocols and different MAC parameters.
... These queues for eight user data priorities (UP) presented in IEEE802.1D standard, declared in Fig.3 High AC priority has small window size which make frame belonging to this AC being transmitted before other frames related to different AC which has larger window size [22]. ...
Preprint
IEEE 802.11x Wireless Local-Area-Network (WLAN) considered a powerful solution for the last mile wireless broadband (BB) access. WLAN becomes important element in 4G and 5G mobile networks because it can provide services to mobile users in areas not covered by eNBs. However, the 802.11 legacy protocol doesn't support delay-sensitive services like VoIP because it adopts the best-effort method. In 2001 IEEE 802.11e standard was proposed to deploy QoS with new access techniques introduction. There are many parameters related to MAC layer which affect the WLAN network performance from the prospective of delay, and throughput. This study presents performance evaluation of voice traffic and FTP traffic in IEEE802.11 legacy protocol WLAN and IEEE802.11e WLAN via OPNET computer simulation. Network performance will be tested against different MAC access protocols and different MAC parameters.
... These queues for eight user data priorities (UP) presented in IEEE802.1D standard, declared in Fig.3 High AC priority has small window size which make frame belonging to this AC being transmitted before other frames related to different AC which has larger window size [22]. ...
... These queues for eight user data priorities (UP) presented in IEEE802.1D standard, declared in Fig.3 High AC priority has small window size which make frame belonging to this AC being transmitted before other frames related to different AC which has larger window size [22]. ...
... In current era computer science is major subject. It has many real-life applications such as cloud computing [1], artificial intelligence [2], virtualization environment [3], Internet of things [4,5,6,7,8,9,10,11], transportation problem [12,13], shortest path problem [14,15,16,17,18,19,20,21], internet Security [22], uncertainty [23,24,25,26] and so on. Malware is not a new threat in security where it exists for decades. ...
Research
Full-text available
A Fileless Ransomware is a new type of ransomware primarily follows the mechanism of both ransomware and fileless malware. Detecting and Defending these kinds of attacks becoming a great obstacle for IT firms. Cybercriminals found a new way of extorting ransom with vicious methods mainly from big organizations, government, Telecom Industry and many more. Traditional AV Engines are not able to defend Fileless Malware. This paper describes the mechanism of both ransomware and fileless malware, the working of fileless ransomware, what are the possible attack vectors of fileless ransomware, variations of fileless ransomware and their instances, Prevention methods and recommendation to defend against Fileless ransomware.
Article
Desktop-as-a-service (DaaS) has been recognized as an elastic and economical solution that enables users to access personal desktops from anywhere at any time. During the interaction process of DaaS, users rely on screen updates to perceive execution results remotely, and thus the reliability and timeliness of screen updates transmission have a great influence on users’ quality of experience (QoE). However, the efficient transmission of screen updates in DaaS is facing severe challenges: most transmission schemes applied in DaaS determine sending strategies in terms of pre-set rules, lacking the intelligence to utilize bandwidth rationally and fit new network scenarios. Meanwhile, they tend to focus on reliability or timeliness and perform unsatisfactorily in ensuring reliability and timeliness simultaneously, leading to lower transmission efficiency of screen updates and users’ QoE when network conditions turn unfavorable. In this article, an intelligent and reliable end-to-end transmission scheme (IRTS) is proposed to cope with the preceding issues. IRTS draws support from reinforcement learning by adopting SARSA, an online learning method based on the temporal difference update rule, to grasp the optimal mapping between network states and sending actions, which extricates IRTS from the reliance on pre-set rules and augments its adaptability to different network conditions. Moreover, IRTS guarantees reliability and timeliness via an adaptive loss recovery method, which intends to recover lost screen updates data automatically with fountain code while controlling the number of redundant packets generated. Extensive performance evaluations are conducted, and numerical results show that IRTS outperforms the reference schemes in display quality, end-to-end delay/delay jitter, and fairness when transferring screen updates under various network conditions, proving that IRTS can enhance the transmission efficiency of screen updates and users’ QoE in DaaS.
Article
Desktop as a Service (DaaS) provides users with flexible, customizable and highly secure cloud based virtual desktop access. As the major carrier of execution results in DaaS, screen updates play an important role in users’ quality of experience. In order to bring users the same feelings like manipulating a local device, timeliness and reliability should be balanced. However, a timely but unreliable transmission scheme (i.e. UDP) or a completely reliable transmission scheme (i.e. TCP) is inappropriate for such a transmission scenario, especially under a high-loss network. In this paper, we propose a Prediction and Network Coding based Transmission Scheme (PNCTS) for efficient screen updates delivery in DaaS. As an end-to-end partially reliable transmission scheme, it prioritizes different data obtained by partitioning screen updates and employs network coding and TFRC (TCP Friendly Rate Control) to compensate for data loss and adjust the sending rate of screen updates, respectively. To reduce the overhead of network coding, PNCTS uses a Hidden Markov Model to predict the reliability level of network and makes different encoding strategies for the data with different priorities. Simulation results show that PNCTS can improve display quality and instantaneous goodput effectively while maintaining end-to-end delay and jitter at a relatively low level under the static and time-varying network conditions.
Article
Collaborative filtering is one of the most powerful customization methods guiding the adaptive web Matrix Factorization and Deep Learning, Collaborative Filtering with the Restricted Boltzmann Machine (RBMS), Big Data Matrix Factorization with Spark Cluster on AWS/EC2, and Machine Learning Effective Learning Strategies. It claims that user satisfaction can only be increased if the movie recommender system understands the users' tastes and openness to new experiences, and so provides personalized recommendations. Currently, our research shows that persons with a low level of openness to experience prefer correct suggestions over fortuitous (for them) ones. Instead, persons who are open to new experiences have no potent feelings about correct or constructive (user) orders. In expansion, to look at if our chatbot movie recommender system improves user satisfaction, this study shows how much the Users' happiness with our recommender system is determined by the manner of engagement (conventional, conversational, or chatbot). According to the findings, the "Chatbot Movie Recommender System" has a beneficial influence on user happiness. KEYWORDS: recommender system, content- based, collaborative filtering, similarity, movie, user.