On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network

Similar documents
Research on Remote Network Bidirectional Detect and Control Model

A Data Classification Algorithm of Internet of Things Based on Neural Network

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

Research on Community Structure in Bus Transport Networks

Analyzing and Improving Load Balancing Algorithm of MooseFS

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c

A Network Disk Device Based on Web Accessing

Information Push Service of University Library in Network and Information Age

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Multi-Step Segmentation Method Based on Adaptive Thresholds for Chinese Calligraphy Characters

Research on Heterogeneous Communication Network for Power Distribution Automation

Preliminary Research on Distributed Cluster Monitoring of G/S Model

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The power quality intelligent monitoring system based on cloud computing Jie Bai 1a, Changpo Song 2b

Shared-network scheme of SMV and GOOSE in smart substation

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

Research Article Mobile Storage and Search Engine of Information Oriented to Food Cloud

The Construction of Open Source Cloud Storage System for Digital Resources

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

A Survey on open Source Protocols SIP, RTP, RTCP, RTSP, H.264 for Video Conferencing System

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*

The Simulation Study of Spread and Evolution about Network Opinion on Education

Energy efficient optimization method for green data center based on cloud computing

Study on Improving the Quality of Reconstructed NURBS Surfaces

Design of Smart Home System Based on ZigBee Technology and R&D for Application

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm

Research Of Data Model In Engineering Flight Simulation Platform Based On Meta-Data Liu Jinxin 1,a, Xu Hong 1,b, Shen Weiqun 2,c

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

A Design of Remote Monitoring System based on 3G and Internet Technology

Research on Digital Library Platform Based on Cloud Computing

The Gene Modular Detection of Random Boolean Networks by Dynamic Characteristics Analysis

Implementation and performance test of cloud platform based on Hadoop

Battery Energy Storage System Information Modeling Based on IEC 61850

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

Serial Communication Based on LabVIEW for the Development of an ECG Monitor

Design of Liquid Level Control System Based on Simulink and PLC

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A priority based dynamic bandwidth scheduling in SDN networks 1

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

An Edge-Based Algorithm for Spatial Query Processing in Real-Life Road Networks

Construction and Application of Cloud Data Center in University

Research on Design and Application of Computer Database Quality Evaluation Model

The Performance Analysis of a Service Deployment System Based on the Centralized Storage

A Multi-party Decision Hot-standby Model

A Dynamic TDMA Protocol Utilizing Channel Sense

Existence and Dynamics of Bounded Traveling Wave Solutions to Getmanou Equation

Efficient Technique for Allocation of Processing Elements to Virtual Machines in Cloud Environment

Research on Remote Sensing Image Template Processing Based on Global Subdivision Theory

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

RoboCup 2014 Rescue Simulation League Team Description. <CSU_Yunlu (China)>

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Network Maintenance Plan

Energy-Aware Dynamic Load Balancing of Virtual Machines (VMs) in Cloud Data Center with Adaptive Threshold (AT) based Migration

Research on the Application of Digital Images Based on the Computer Graphics. Jing Li 1, Bin Hu 2

Fault Diagnosis of Wind Turbine Based on ELMD and FCM

A Personalized Cloud Services Recommendation Based on Cooperative Relationship between Services

An Adaptive Histogram Equalization Algorithm on the Image Gray Level Mapping *

Processing Technology of Massive Human Health Data Based on Hadoop

A Decision Support System Based on SSH and DWR for the Retail Industry

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

Research on friction parameter identification under the influence of vibration and collision

A Method of Identifying the P2P File Sharing

Road Network Traffic Congestion Evaluation Simulation Model based on Complex Network Chao Luo

The Design of Distributed File System Based on HDFS Yannan Wang 1, a, Shudong Zhang 2, b, Hui Liu 3, c

Australian Journal of Basic and Applied Sciences. Comparative Investigation On Mygrant Wlan Performance Analysis With And Without Load Balancer

New research on Key Technologies of unstructured data cloud storage

A New Evaluation Method of Node Importance in Directed Weighted Complex Networks

Wireless thermal charging system based on GPRS technology 1

Intelligent Mobile Monitoring and Control Network of Oil Pipeline Based on Internet of Things

Study on Programming by Combining Java with C++ Based on JNI

Design of Coal Mine Power Supply Monitoring System

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang

Design and Implementation of Dual-Mode Wireless Video Monitoring System

Charting the Progress of Smart City Development in Shanghai

Research on software development platform based on SSH framework structure

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network

Research on Cloud Resource Scheduling Algorithm based on Ant-cycle Model

The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus

Information Fusion Based Fault Location Technology for Distribution Network

The Research and Design of the Application Domain Building Based on GridGIS

A Finite State Mobile Agent Computation Model

2 Proposed Methodology

Self-organized Routing for Radial Underwater Networks PAPER ID: 2326 AUTHORS: WAHEEDUDDIN HYDER JAVIER PONCELA PABLO OTERO

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2

Traffic Flow Prediction Based on the location of Big Data. Xijun Zhang, Zhanting Yuan

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA

A Two-Tier Distributed Full-Text Indexing System

Ontology Molecule Theory-based Information Integrated Service for Agricultural Risk Management

Comparison of 3-D Fracture Analysis Methods Based on ANSYS Workbench

Design of Intelligent System for Watering Flowers Based on IOT

Implementation of a wireless energy management and safety system

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Application of Co-simulation Technology Based on LabVIEW and Multisim in Electronic Design

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

A new Class of Priority-based Weighted Fair Scheduling Algorithm

Research on Relative Coordinate Localization of Nodes Based on Topology Control

Transcription:

1288 JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network Hongyao Ju Zhejiang Textile & Fashion College, NingBo 315211, P.R.China Email: juhongyao@163.com Fei Luo Ningbo Branch Company, Sichuan Anmeng Information Safety Ltd, Ningbo 315000, P.R.China Email: luofei@anmeng.com.cn Abstract This paper discusses the construction and a logical method of multi-access manufacturing cloud core networks. The key technologies involved in the logical of multi-access manufacturing cloud core networks are discussed in detail. Focusing on the key technologies including access load scheduling, access flow monitoring, control, and gateway integration, the principle and an corresponding effective approach have been developed to effectively expand the access bandwidth of a manufacturing cloud core network through multi-access. A preliminary implementation model has been developed according to the proposed structure and the proposed key technologies, which provides supports to the maximization of the performance of manufacturing cloud core network. Index Terms Manufacturing Cloud, Logical Bandwidth, Traffic Monitoring, Load Scheduling, Link Aggregation I. INTRODUCTION With the continuous transformation of the manufacturing industry, high-end manufacturing not only has been facing unprecedented challenges, but also encountering excellent opportunities for innovation and development. Literature[1]-[3] provided a new idea for the sharing of manufacturing resources and capacities, which is known as manufacturing cloud. The key technologies related to manufacturing cloud are comprehensively discussed in the literature as well. The spread and the application of manufacturing cloud provide faster channels for the technology collaboration and achievement transformation between many research institutes and manufacturing enterprises. Manufacturing Cloud integrates a number of technologies[4]-[11] including the manufacturing information, cloud computing, and internet of things. It centralizes the allocation of manufacturing resources, research and innovation resources, and management resources, and has a wide extension on its services through information network. This provides an efficient, convenient, service-on-demand, and reliable collaborative services to manufacturing enterprises. The key to the smart expansion of manufacturing cloud core network access bandwidth is to effectively superimpose the bandwidth of each access in order to form a single logical and make each physical access collaborate with each other smartly according a certain load balancing strategy. This will greatly increase the total carrying capacity of the logical. Manufacturing Cloud core network is connected to WAN through access s. Terminal manufacturing systems that locate at different regions are connected to the manufacturing cloud core network through WAN. Therefore, the total bandwidth of the access to WAN for the manufacturing cloud core network is one of the key factors that affect the performance of the manufacturing cloud system. In this paper, based on literature[12]-[20] and technologies including load scheduling, flow monitoring, smart control, and gateway integration, we propose an approach that smartly expands the total access bandwidth of the manufacturing cloud core network and balances the total load flow according to the sub-bandwidth of each physical. We also give an in-depth discussion regarding the key technologies involved in this approach. The proposed method breaks through the restriction in traditional approaches that each participating must have the same transmission rate. II. MANUFACTURING CLOUD CORE NETWORK ACCESS STRUCTURE AND ACCESS LINK AGGREGATION PRINCIPLE The data transmission between the manufacturing cloud core system and terminal manufacturing system has to go through access s. The total bandwidth of access s determines the response performance of a large number of concurrent accesses from the terminal manufacturing systems to the manufacturing cloud core network. Manufacturing cloud core network is connected to WAN through multiple access s with same or different bandwidths and rates. All the access s share the massive data transmission tasks produced by the concurrent accesses from terminal manufacturing systems through load scheduling. The structure design of the access s and the method determine doi:10.4304/jsw.9.5.1288-1293

JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 1289 the expansion capacity and costs of the access bandwidth. A. Manufacturing Cloud Core Network Access Link Structure The manufacturing cloud core network is connected to WAN and terminal manufacturing systems through multiple physical access s, as shown in Fig.1. Manufacturing cloud core network Gateway 2 Gateway N Gateway 1 Access N Access 1 Access 2 Design and research institutes WAN Terminal manufacturing system Link flow monitor Access load scheduler Link controller Figure.1 The structure of a manufacturing cloud system It can be seen from Fig.1 that all the N physical access s connecting the manufacturing cloud core network and WAN are able to transmit data from terminal manufacturing systems, which reduces the load pressure on a single access to a certain extent. Under the circumstances with no load scheduling strategy, the concurrent accesses to the manufacturing cloud core network from multiple terminal manufacturing systems could be transmitted on a single or a few access s and other access s receive very little data flow or are even in idle state. When the bandwidth of a single or a few access s is not large enough to meet the requirements of large real-time data transmission, overload will happen and terminal manufacturing systems will not obtain the required production data in time, which could seriously affect the production of online manufacturing enterprises. In order to prevent the situation where some access s are overloaded and at the same time others are in idle state and effectively use the physical bandwidth of each access, the accesses from terminal manufacturing systems should be allocated according to the instantaneous carrying capacity of each access. The allocation helps the realization of the flow balancing among multiple physical access s and the logical of all the physical access s, which achieves the goal of effective expansion of the total access bandwidth. In this paper, a composite structure consisting of a load scheduler, a flow monitor, a controller, and an integrated gateway is used to resolve the logical problem among multiple physical access s. B. Manufacturing Cloud Core Network Access Links Aggregation Principle In order to realize the flow balancing of each physical access and the effective logical among access s, the access load form the terminal manufacturing systems are allocated to different physical access s through a pre-positive access load scheduler according to the instantaneous carrying capacity of each physical access. The scheduling is performed in order. The total access load for each physical access is proportional to its bandwidth. The access load allocated to each physical is then determined together by the access load scheduler and the amount of bound to the gateway of the. As a result, an effective superimposition of each physical access can be realized by the load scheduling strategy. Also, multiple physical access s are aggregated to one logical with wider bandwidth, completely expanding the total carrying capacity of the access s. The response time could be reduces as well. For those physical access s whose actual load is close to the limits, the load scheduler will temporarily stop allocating loads to them. The load allocation will resume once the load decreases below some safety value. When the actual loads of all the access s reach the limit values, the system alerts the network administrator. The detailed is shown in Fig.2. Access load scheduler Link controller Logical Link flow monitor The access load form the terminal manufacturing systems Link 1 Link 2 Link N Figure.2 Multiple physical access principle Gateway 1 Gateway 2 Gateway N In Fig.2, the flow monitor monitors the load flow of each access in real time. Link controller adjusts the amount of bound to

1290 JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 each access gateway external network card according to the load flow of each physical access. At the same time, the controller also adjusts the amount of IP addresses mapped by the same application domain set in the load scheduler in WAN. III. KEY TECHNOLOGIES FOR MANUFACTURING CLOUD CORE NETWORK MULTI-ACCESS LINK AGGREGATION A. Access Load Scheduler Access load scheduler is used to allocate the total load from the terminal manufacturing systems to different access s according to the instantaneous carrying capacity of each physical access. This function is realized by the mapping between a same application domain and multiple. Several are grouped based on the access s they belong to. Each group corresponds to one access gateway. All the groups are sort in order and form an list. The domain name point accesses the list in order. In the list, the number of in each group is different. The total load produced by application domain name accessing the manufacturing cloud core network is allocated to different physical access s successively according to the order of each group and the number of in the group. The number of groups is determined by the number of physical access s. The number of in each group is adjusted by the controller according to the loads. The principle of the access load scheduler is shown in Fig.3. Domain name point 11 12 1i 21 22 2j N1 N2 Nk list Figure.3 The principle of the access load scheduler where i, j, and k represent the number of in group 1, 2, and N, respectively. B. Link Flow Monitor The flow monitor scans the data flow of each access gateway netcard in real time. It also provides statistical analysis about the data flow for certain time periods. The analysis results for the flow of each single group 1 group 2 group N Gateway 1 Gateway 2 Gateway N physical access f(x) and the results for the total flow of all the access s G(x) are obtained. G(x) is calculated according to the following equation. G(x)=F(x) 1 + F(x) 2 + +F(x) N, (1) where 1, 2,, N are the indices of each access s. First, G(x) is compared with the total carrying capacity of all the access s MAX to determine the current working status of the manufacturing cloud core network access s. If G(x) MAX, the system overloads and alerts will be sent. If G(x)<MAX, the f(x) of each access will be sorted by their magnitude and the index of corresponding access will be recorded. Then, the flow statistical results of each access will be compared with the upper and lower threshold M1 and M2 in order to adjust the load allocation strategy, where M1 and M2 are determined by the percentage of the maximum carrying capacity of a single physical access depending on the circumstances. The statistical analysis for the loads and the output results are shown in Table I. In table I, C1 represents the condition 1, C2 represents the condition 2, C3 represents the condition 3, represent the load flow of the 1 st, 2 nd,, N th access. TABLE I. STATISTICAL ANALYSIS AND OUTPUT RESULTS FOR THE LOAD C1 C2 C3 G(x) MAX G(x)< MAX G(x)< MAX f(x) M1 f(x) M2 All greater or equal to M1 Not all are greater or equal to M1 All are less or equal to M2 Not all are less or equal to M2 Access status Overload Heavy load for all s Heavy load for single Idle state for all s Idle state for single Output Result System alert No strategy implemented. System administrator to be notified. Notify the controller to reduce the upcoming accesses to this No strategy implemented Notify the controller to increase the upcoming accesses to this C. Link Aggregation Controller Link controller controls the access load scheduler and the access gateway according to the output results of the flow monitor. All the available external by the manufacturing cloud core network are stored in the controller. When G(x) < MAX, the control strategy is based on the simultaneous increase or decrease of the number of of the access load scheduler and the number of

JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 1291 bound in the access gateways. The detailed process is shown in Fig.4. group m group n m1 m2 m(p-1) n1 n2 n(q+1) list of access load scheduler Link controller Output results of the flow monitor m1 m2 m(p-1) n1 n2 n(q+1) bound in the access gateway Figure.4 Control strategy for the controller In Fig.4, p and q are the number of in the group m and n as well as the bound to gateway m and n, respectively. When the m th (1 m N) overloaded, i.e. f(x) m M1, if not all the f(x) of the access s are greater or equal to M1, the controller will automatically change the application domain name and the mapping list in the access load scheduler to reduce the number of in the m th group. The number of bound to the m th access gateway will be reduced as well. Meanwhile, the number of in the nth group corresponding to the n th (1 n N) will be increased in the access load scheduler. The amount of bound to the n th access gateway will be increased as well. When some access is in idle state, for example, for the n th, f(x)n M2, if not all the f(x) of the access s are less or equal to M2, the controller will also change the application domain name and the mapping list in the access load scheduler to increase the amount of in the n th group and simultaneously increase the amount of ed bound to the nth access gateway. At the same time, the amount of in the IP address group m (1 m N) corresponding to the with the largest load is reduced in the access load scheduler. The amount of bound to the m th access gateway is reduced as well. The controller decreases the load for the m th heavy-loaded and increases the load for the nth which has a little load by the above method. Finally, the logical superimposition of the bandwidth of each physical access is completed and the of access s is realized. Gateway m Gateway n D. Access Gateway Access gateway is a connection device between each physical access and the manufacturing cloud core network. Multiple are bound to the external network card of each access gateway. These match the corresponding group in the IP address list in the access load scheduler and guide the visits from terminal manufacturing systems to the manufacturing cloud core network into different access s. Then, the load scheduling and the logical of different physical access s can be realized. The matching relation between the binding IP addresses of each access gateway and the groups in the access load scheduler is shown in Table II. TABLE II. MATCHING RELATION BETWEEN THE GATEWAY BINDING IP ADDRESSES AND THE IP ADDRESS GROUPS IN THE ACCESS LOAD SCHEDULER Gateway name group bound to gateway group in the access load scheduler Gateway 1 Gateway 2 Gateway N group 1 group 1 group 2 group 2 group N group N IV. TESTING, RESULTS, AND DISCUSSIONS A. Testing Environment For the convenience of the testing and evaluation of the smart expansion technologies of the manufacturing cloud core network access bandwidth, we used two access s and ten testing terminals that continuously accessing the manufacturing cloud core network. The detailed parameters are shown in Table III. TABLE III. PARAMETERS FOR THE TESTING ENVIRONMENT Access s Access 1, 100Mb Access 2, 100Mb Number of manufacturing cloud core networks Three server (1 cluster) Number of testing clients Due to the uncertainty during the operation of network, in order to verify the generality and reliability of the key technologies of the smart expansion of manufacturing cloud core network access bandwidth, different network segments of the same location of all the tested terminals were selected in the testing. The sampling time of flow was one minute. Link flow data of 10 time points with and without were collected respectively. 12

1292 JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 B. Results and Discussions Data flow as a function of time of access 1 and 2 without being implemented is shown in Fig.5. Data flow as a function of time with implemented is shown in Fig.6. Figure.5 Link flow as a function of time without It can be seen from Fig.5 that when there is no, with the increase of time and concurrent accesses, the total data flow increases. At the same time, the increase of the data flow in access 1 and 2 is uncontrollable in a way that the data flow is relatively centralized in access 1 and the bandwidth of access 2 are not sufficiently used. The distribution of load is not uniform. When the total flow of the system is large, access 1 will be blocked or even fail. Figure.6 Link flow as a function of time with From Fig.6, it can be seen that after implementing, under the same testing environment, with the increase of time and the data flow caused by concurrent accesses, the data flow in access 1 and 2 grows slowly in a same pace. Additionally, the data flow in access 1 and 2 are gradually approaching to each other. After the seventh testing time point, there is a jump in the data flow of access 2 and the data flow of access 2 exceeded that of access 1. With the increase of total access flow, at the ninth testing time point, there was also a jump happened in the data flow of access 1, which made the data flow exceeded that of access 2. The results show that under the control of the strategy, both physical access s are able to share the data flow generated by the accesses of the terminal manufacturing system. The bandwidth of each access was sufficiently used and the logical was realized. It can also be seen from the trends the data flow of access 1 and 2 that of it took about seven minutes for the bandwidth expansion technology and strategy to reach an ideal working condition., The became stable right after the alternative jumps of the data flow of each access happened. Similarly, when the total access data flow gradually decreases, the will result in alternatively downward jumps for the data flow of each access. Through the above analysis, it is illustrated that the smart access bandwidth expansion technology for manufacturing cloud core network solves the smart problem for multiple physical access s and realizes the balancing of access flow among all the physical access s. V. CONCLUSIONS Currently, many core networks possess multiple physical access s. However, due to the defects in load balancing strategy, the load is not uniformly shared and the utilization of physical s is low, which makes the access s the bottleneck of the high-performance of the core network. In this paper, a approach for multiple physical s was proposed. The approach does not require same rate at eh device ports during the. It can effectively expand the logical bandwidth of the entire access s. Since the method only groups the in the access load scheduler, the implementation is easy, but it also caused the load being successively allocated to the same physical access. When there are more access s, the time spent for the to reach a stable working condition will become longer. This is an area that needs further investigations for a solution. ACKNOWLEDGEMENT This paper is supported by Natural Science Found ation of Zhejiang Province (Grant No.Y1101154), Natural Science Foundation of Ningbo City (Grant No.2010A610128), and Ningbo Intelligence Group Entrepreneurship Project(Grant No.2013B70071),China.

JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 1293 REFERENCES [1] B. H. Li, L. W. Zhang, S. L. Wang, et al. Cloud manufacturing-- a new service-oriented manufacturing mode, Computer Integrated manufacturing Systems, vol.16, pp.1-8, January 2010. [2] F. L. Liu, S. Qi, Y. H. Song, Connotation state-of the-art and Research Tendency of Network Manufacturing, Chinese Journal Mechanical Engineering, vol.9, pp.1-6, September 2003. [3] K. Chen, W. M. Zhang, Cloud Computing: System Instances and Current Research, Journal of Software, vol.20, pp.1337-1348, May 2009. [4] H. S. Ning, Y. L. Zhang, F. L. Liu, et al, Research on China Internet of Things services and Management, Acta Electronica Sinica, vol.34, pp.2514-2517, December 2006. [5] S. B. Sheng, Q. L. Fan, P. Zong, et al, Study on the Architecture and Associated Technologies for Internet of Things, Journal of Nanjing University of Posts and Telecommunications:Nature Science, vol.29, pp.1-11, December 2009. [6] D. C. Zhou, G. F. Yin, Research on Resource Sharing Service Platform Oriented to Networked Manufacturing, Computer Integrated Manufacturing Systems, vol.11, pp.781-787, June 2005. [7] L. Zhang, Y. L. Luo, F. Tao, L. Ren, et al, Key Technologies for the Construction of Manufacturing Cloud, Computer Integrated manufacturing Systems, vol.16, pp.2510-2520, November 2010. [8] F. Tao, Y. F. Hu, L. Zhang. Theory and Practice:Optimal Resource Service allocation in Manufacturing Grid, Beijing: China machine Press, 2010. [9] R. Buyya, C. S. YEO, S. Venugopal, et al, Cloud Computering and emerging IT Platforms: Vision,Hype,and Reality for Delivering Computing as the 5th utility, Future Generation Computer Systems, vol.25, pp.599-616, June 2009. [10] J. Shiers, Grid Today, Clouds on the horizon, Computer Physics Communications, vol.180, pp.559-563, August 2009. [11] L. Atzori, A. M. Tera OR A. G. Bito, The Internet of Things: a Survey, Computer Networks, vol.54, pp.2787-2850, May 2010. [12] Y. X. Xu, T. Y. Liang, et al, Federated integration of Networked Manufacturing Service Platforms, Collaborative Design and Manufacturing, vol.22, pp.317-327, July 2008. [13] Y. W. Pan, M. Yang, et al, Weak Client Data Transmission Model Based on Multi- Aggregation, Computer Engineering, vol.36, pp.99-104, April 2010. [14] J. W. Shu, B. Yu, W. Xue, et al, Design and Implementation of TH-iSCSI-A Storage System with High Availability, Journal of Computer Research and Development, vol.44(suppl.), pp.82-90, December 2007. [15] M. F. Lu, S. Q. Guo, Q. M. Yang, Research on Preemptive Support of Port Selection Logic Mechanism for Link Aggregation Group, Journal of Zhejiang University of Technology, vol.39, pp.114-118, February 2011. [16] W. N. Liu, B. Liu, D. H. Sun, Multi-task Oriented Service Composition in Cloud Manufacturing, Computer Integrated Manufacturing Systems, vol.19, pp.199-209, January 2013. [17] W. F. Pan, B. Li, Y. T. Ma, et al, Multi-Granularity Evolution Analysis of Software Using Complex Network Theory, Journal of Systems Science and Complexity, vol.24, pp.1068-1082, December 2011. [18] P. Cao, T. Jian, H. Y. Wang, The Research of the Intelligent Device Management and Diagnostic, TELKOMNIKA Indonesian Journal of Electrical Engineering, vol.10, pp.1999-2005, December 2012. [19] H. Y. Ju, A kind of Network Connection System with Compound Gateway. CN202111731U (Patent).2012. [20] L. J. Zhang, X. Wei, X. H. Xian, Research on Web-based Real-time Monitoring System on SVG and Comet, TELKOMNIKA Indonesian Journal of Electrical Engineering, vol.10, pp.1142-1146, September 2012. Hongyao Ju was born on May 3, 1966, male, from Ningbo, Zhejiang province, who is currently an associate professor of computer applications and master advisor at Zhejiang Textile & Fashion College. His research area includes manufacturing networks, cloud computing, intelligent optimization, and etc. he received the bachelor degree in industry of fine chemicals from Qiqihar Institute of light industry, in June 1991. Fei Luo was born on July 1, 1969, female, from Ningbo, Zhejiang province, who received the bachelor degree in business administration from Beijing Xinghua University, in July 1994. Currently, she is an engineer at Ningbo Branch Company, Sichuan Anmeng Information Safety Ltd. Her research interests include computer network and information technology. Corresponding author: Hongyao Ju: Address: 495 Fenghua Road, Jiangbei District, Ningbo, Zhejiang. Telephone: +086 13336666610. E-mail: juhongyao@163.com Zip code:315211