ESRWF: Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model

Size: px
Start display at page:

Download "ESRWF: Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model"

Transcription

1 ESRWF: Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model Snehil Sharma 1, Abhishek Mathur 2, Shailendra Shrivastava Samrat Ashok Technological Institute (SATI) Vidisha (M.P.), INDIA 1 sharmasnehil.pub@gmail.com, 2 abhi_math2@yahoo.com, 3 shailendrashrivastava@rediffmail.com 3 Abstract Despite all the hypes, the designers of Workload Factoring solutions have consistently debated on the tradeoffs between factoring of workload and their resulting performance. When computational resources are provided to the existing system; one of the main challenges that the computing community is face dazzling workload of application requests and deteriorating performance at runtime of particular server-site. To address those concerns that, we propose an Extreme State-Rank based Workload Factoring for Integrated Cloud Computing Model. It consolidates components in Cloud infrastructure at On-Off both type premises of internet based applications. The Intelligence in this approach lies in extreme factoring of performances of system into States (Regular & Critical) during period of experiencing workload by running system and dynamically distribution of State-Rank {,, } to incoming requests at duration of particular system state in running system. We also propose ESRATE as efficient Workload Factoring algorithm with some specified features, which enables factoring of incoming oppressive requests on the basis of State, State-Rank & Request-Weight- Coefficient explicitly. Through extensive analysis with efficient simulated evaluations, we predict and showed Workload Factoring technology to achieve Request Concurrency with availability of servers, Unique Video Requested with best resource proficiency (=%), the ratio of the maximum load to the average load (=.) with formulation of speedup ( ) and Memory-Prediction-Error (ε) as well as reduced data cache and replication overhead in critical state especially. I. INTRODUCTION Cloud Computing is an emerging trends of Distributed Computing and generalization of Grid Computing known either as online services such as Amazon AWS [1] & Google App Engine [5] for enabling convenient, on-demand services access to a shared pool of configurable computing resources (e.g. Networks, Servers, Storage, Applications, and Services) that can be rapidly provisioned and released with minimal intelligent management efforts or service provider within interactions of regulations. Critics argue that Cloud Computing is not reliable enough due to the tension created by incoming oppressive requests. It has features of shared computing infrastructure for hosting multiple applications where management complexity is hidden and resource multiplexing leads to proficiency. More computing resources are allocated on demand to application when its workload incurs more resource demand than it is currently allocated. So here, we focus on Workload Factoring [16] as solution in this paper as it is a unique functionality requirement by Cloud Computing Architecture. Besides the presentation consolidation, we also proposes an term Integrated Cloud Computing Model called joint venture for all cloud deployment model described in fig.1 where enterprise and IT consultants can base to design and plan their computing platform for hosting Internet based applications with highly dynamic workload. The Cloud Computing model features two analytical ideas as: ESRWF & ESRATE for system which is naturally and randomly appeared different components in aggregate workload of internet applications. An efficient workload factoring philosophy is shaped for enabling technology of the Integrated Cloud Computing Model. Its basic function is to split & control the workload into two parts upon (unpredictable) load spikes, and assures that the critical workload incurs minimal cache/replication demand on the application data associated with it. This simplifies the system architecture design for the Critical State and significantly increases the server performance within it. As for the Regular State, workload dynamics are reduced significantly; this makes possible resource capacity planning with low over-provisioning factor and/or efficient dynamic provisioning with reliable workload prediction. We built a video streaming service and flow of request for Formularize Description and Tri-Way Trajectory Simulation as an experimental showcase of the Integrated Cloud Computing Model. It has a local cluster as the regular workload region e.g. LDC [18] and the critical workload region e.g. [1], [5]; the workload factoring scheme was implemented as a load controller to arbitrate the stream load distribution between the two states. With extensive Analysis, Observation Tracery, and Tri-Way Trajectory Simulation experiments, we

2 showed this workload factoring technology can enable reliable workload prediction in the Regular State, request rate & request rate coefficient, effective ratio of the maximum load to the average load, Memory-Prediction-Error (ε) in Critical State, achieved resource proficiency and reduce data cache/replication overhead in the Critical State, and react fast (with an speedup factor) to the changing application data popularity upon the arrival of oppressive request. The rest of paper is organized as follows: here Section-II describes the previous related work done for Workload Factoring. Section-III describes rationale for the Proposed Integrated Cloud Computing Model and proposed ESRWF respectively. For evaluation, we have to Analysis and Performance Criteria in Section-IV & Section-V respectively. We conclude this paper with future work in Section-VI. II. RELATED WORKS Amazon launches CloudFront [2] for its AWS customers (who can now deliver application load through global network) in November 2008 and after two months, in February 2009, H. Zhang, G. Jiang, K. Yoshihira, H. Chen, and A. Saxena proposed Intelligent workload factoring for a hybrid Cloud Computing model [16] with introduction to base workload zone and trespassing workload zone with formularized descriptions of Traffic- Estimation of [14], [19], [9]. Around the same time period VMWare also release the vcloud service concept [7] for Virtual Data Center Operation System as experimental view of Para-Virtualization, which helps cloud customers to leverage off-premise computing capacity. On follow this way, Berkeley researchers [17] offer a ranked list of obstacles to the growth of Cloud Computing. Similar to the points, we made in the introduction, the concerns on public Cloud Computing services include service availability, data confidentiality and auditability, performance unpredictability, and so on. On discuss SOMA (Service Oriented Model & Architecture), we believe an Integrated Cloud Computing Model makes sense to enterprise IT and can resolve many issues raised from Intrgrated Cloud Computing model. Through Content Distributed Network (CDN) and web caching workload factoring happen between a local web server and proxy servers. The typical method is DNS redirecting and the workload factoring decision is predefined manually over a set of most popular web objects. When current IT systems evolve from the dedicated platform model to the shared platform model along the cloud computing trend, we believe a core technology component is required on flexible workload management working for such models mentioned above, and our workload factoring technology (ESRWF) is proposed as one answer for it. III. PROPOSED RATIONALE : ESRWF In the proposed Integrated Cloud Computing Model, which designs also as fair arranged integration of unlimited & limited both type proposals for resolving the workload, Model defines two states for resource management: Regular State which is original & has limited resources in dedicated application platform in Local Internet Data Center (LDC) [18]. In this state all processes run all time and with balanced load of application & system. As processing the data volume doesn t vary sudden and strike after removing at high workload. The LDC is expected to run in relaxed mode and with high resource proficiency & managing facility for best utilizing scenario even though resource provisioning for QoS guarantee. Another is Critical State in which all resources in dedicated application platform operated by cloud service provider & related infrastructure. This state is provisioned on high demand and also optimizes to be on for a momentary variation of critical oppressive runtime periods. Here, Resources are provided at large scale. Each state has its local load balancing scheme managed according to workload present in runtime. The origination of model is lies in dynamic workload as Hub & Spoke Infrastructures. It addresses many concepts where IT consultants completely rely on extreme utilization of cloud services for application hosting. At some cases, we can t predict some type unexpected workload. We define it as two ways as Least Workload Left (LWL) and Maximal Workload Left (MWL). It is necessary to learn these natures of high spike& burst-time as well as find out an efficient way to handle it once such events happen. Ongoing way of Customer Resource Management (CRMs) and Information Life-Cycle Management (ILMs) with Integrated Cloud Computing Model, we identified that the resource management applied through our scheme has efficient impact to resolve oppressive workload on different components of aggregated applications during runtime as intelligent satisfaction for customers. This scheme varies in our model as three ways-

3 Opportunistically, achieves resource proficiency with reliable prediction on the regular workload seen most of the time achieves through local data center. Optimistically, response to high workload manages in rare time with the requirement of agile and responsive performance through cloud services. Deterministically, neglecting the response to sudden panic or oppressive workload dispose in rare time when the system is not agile to give 100 percent performance. For scheme s concreteness, we have to aimed design goals of workload factoring solutions included four: Reducing the higher workload and dynamic complexities in Regular State oriented application platform and avoiding overloading scenarios through Draining & Dispatching. Create Critical State oriented application platform enable through workload decomposition based on preliminary features of empirical threshold of system. Making rationale agile with resource managed Integrated Cloud Computing Model. Minimizing the data cache and replication overhead through Draining & Dispatching of selected requests for similar data objects into Critical State. A. Inspirational Logic View We give logical inspiration through fig.2 for ESRWF (Extreme State-Rank based Workload Factoring) scheme which has four basic components: System Mentor, State-Rank Distributor, Migration Controller and Resource & Workload Manager. The System Mentor updates the information of currently running system in case of workloads upon incoming requests and also keeps track of system performance and response to request of each data item. State-Rank Distributor distributes state-rank to each request as 0 (for Regular State) & 1 (for Critical State) to follow empirical threshold of empirical threshold indicator. Resource & Workload Manager Empirical Resource Estimator Threshold Indicator R System Mentor State-Rank Distributor 1 0 Migration Controller Ф, Drain 1, Cloud 0, LDC Figure 1. Inspirational Logic View of ESRWF with their elementary parts Resource & Workload Manager has two components these are Empirical Resource Estimator & Threshold Indicator may be say as primary & secondary component also respectively. The primary component checks the system state and estimates the request rate and request weight coefficient. This specifies the system performance & capacity, availability of resources and maximum loads that can be handled by system in Regular State. It may be set through previous information of system history that may be managed through predefined instructions with automatically or may be manually operated based on average records of previous Regular State which are used as resource provision decision. And secondary component of Resource & Workload Manager is based on empirical threshold of system is only and only applied to request has state-rank 1 in Critical State, it may be considered as anomalous entity so it redirect to cloud services otherwise drained for reliable & secure system from high unacceptable workload. After tagging state-rank and designation of threshold as 0, 1 in which 1 state-ranked request again ranked by Migration Controller for redirecting or draining. If it overhead the empirical threshold and MWL than it must be processed to drain with state-rank updated as φ. So, Migration Controller takes decision according to prerequisite conditions that which request type or rank type be redirecting to LDC or Cloud Services or Drained.

4 B. ESRATE Algorithm Now, we process algorithm ESRATE: Extreme State-Rank based Traffic Estimation which maintains two tables: Stateless Predecessor Table (SPT) and Count & State-Rank Table (CSRT). Given a request R, the algorithm outputs are Regular State processing if r will go to the Regular State with state-rank 0 otherwise Critical State Processing if it has state-rank 1 otherwise drained from this approach. It works as followed: Comparison Counter R Request + R R1 R2 Counting Data-ID Weight S-R Stateless Predecessor Table Filtering Figure 2. ESRATE Nidus View and Implementation of algorithm If the system is in Regular State, the CSRT (Count & State-Rank Table) is always set as Empty when first request R is arrived. If R matches any data item of CSRT (for asking same data) increase the counter of data item by 1 in counter column and update state-rank 0. If system is setting as Regular State after going Critical State then on basis of MWL (Maximal Workload Left) [10] [11], request is processed by LDC. Otherwise, randomly draw M requests from FIFO queue named as SPT (Stateless Predecessor Table) & compare them with R, if R matches any of the M request (for asking same data), pick that data item & put in CSRT with initialization of counter as 1 and state-rank 0 & update CSRT. If any request doesn t arrived again then system automatically dispose request from SPT, because there is no mean of that request to keep continue in SPT. At starting, if any data item requested at Critical State then it follow same procedure as when it is entered in Regular State. If data item of request R doesn t belong to CSRT then add R into SPT FIFO queue for request logs & returns. In Critical State, reset all counters to 0 and set state-rank 1 and calculating the request rate of each data item participated in CSRT. For each data item in CSRT, the request rate is its counter value divided by total requests arrives since entering the system in Critical State. Also, calculate estimated request rate correspond of each data item according to Section-V. If requests of data item cross or overhead the Empirical Threshold Indicator means workload so high not managed by system then request will be signified with state rank φ since draining it automatically. Otherwise redirect to cloud services on basis of LWL (Least Workload Left) [10] [11] as prerequisite Workload Factoring scheme with increment count by 1 and state-rank 1. The reason for the calculation of the request weight coefficient with request rate in cloud is that, the user feels request behavior inflicts two types of request rates: Peak Request Rate (20 videos per 6 seconds) which discriminates with less request weight coefficient & LWL basis to cloud services, other is Average Request Rate (20 videos per 60 seconds), the ARR is a long term rate while the PRR is a temporal rate have MWL be undertaken by LDC. IV. ANALYSIS A. Notation and Accuracy Requirement Matching Count and State-Rank Table

5 We assume that each request belongs one of data item. The rate of request denoted by and let = denote total request rate to system. Let = denote the proportion of request rate or actual request rate to the system that belongs to request. We have to design an efficient scheme to estimate for each. Since it is easy to measure, instead of directly estimating, we solve the equivalent problem of getting an estimate! of for each. Then we use! to estimate. We can view as the probability that an arriving requests belong to data item. We assume that is static or stationary over the time in which the estimation is done. We also assume that the probability that an arriving request belongs to a given data item is independent of all other requests. We can sample randomly in order to reduce this dependence. We now give the accuracy requirement for ESRATE will determine an estimated " such that-! # % 2, + % 2 ( *! # -% 2, + -% 2 ( * > With probability greater than / means we are willing to tolerate an error of % with probability less than / for all and an error of -% with probability less than / for all >. We consider that the proportion for most data item lies below some threshold proportion and we want the estimation to be accurate in the range [0, ]. Formally, we are given threshold proportion 0 1 and parameter - 1. A case, if there are data items with proportion greater than. The ESRATE will estimate with relative estimation error range of 3 4 5,16%. We use 7 8 =4.00 to denote the / percentile as Unit Normal Distribution, such as if / =99.9%. B. Main Result- as per follow complete process of [14] [19]. Lemma-1: Let ;(<,) represents the number of requests for data item after N request arrivals for ESRATE with = comparisons for each arrival. Then- Where, G 5 = I4JK L MN4O L(LPQR)S RTS U V <=?@ A(B,) BC D <[0,G 5 ] Proof: Follow the results of Lemma-5 from ESRATE [14] [19]. C. Minimum Sample Size Here Minimum Sample size is defined to be the number of request arrivals needed to perform the estimation. We may say the term estimation time and sample size interchangeably. CSRT serves as a filtering process on request which is entering in the SPT. We approach counting process when without using CSRT and that actively using the CSRT filtering process. Then, the minimum sample size of CSRT- D. Request Weight Coefficient < = W X L CY L (1) The heavy workload where there is no way to provide fairly service to high spikes having or bursty applications in the presence of oppressive users in Critical State. We have to provide dynamically decreasing weight of request through estimated coefficient for oppressive users to handle the fact that it is consolidates to assign static request weight accurately. This weight fixed according to request rate. It protects innocent users by discriminating oppressive users on heavy workload in Critical State. At processing dynamic request weight coefficient that reduces

6 g International Journal of Electronics and Computer Science Engineering Application Requests Local Data Center Runtime Server Extreme State- Rank Based Workload Factoring (ESRWF) State- Critical/Regular, Rank- 0/1/ф, X-100 % Resource Utilization HTTP Request HTTP Reply Empirical Threshold Dispatching Decision Decision Making rtsp://out_streamserver_ldc// Application Servers Rank- 0 Application Servers Yes or Rank- ф Tri-Way Trajectory rtsp://in_streamserver_noway// Simulations rtsp://in_streamserver_cloud// No, and Rank- 1 Cloud Services Application Servers Integrated Cloud Drain Resolver Application Servers. Shared Resource Platform (Cloud Infrastructure) Dedicated Application Platform (Local Data Center) Local Storage Open source RTP/RTSP Streaming Server With Heterogeneous, Hybrid & Community Cloud Cloud Storage Cloud Storage Cloud Storage Figure 3. Resource Management Scheme for Proposed Integrated Cloud Computing Model and Tri-Way Trajectory Simulation overview the weight assigned to oppressive users. For every request the mechanism counts the amount of traffic as total number of request and request rate with used memory. It uses this amount to affect the weight given to the innocent users. A time unit is set to roughly the expected burst time Z where ]^^ is average request rate. Let ^(_) be [\\ request rate measured in the requests is particular request s counter value divided by total requests arrives since entering the system in Critical State. Let ` be the amount of offered traffic during last sliding window. Request Weight coefficient, a() is- b, `+a()= N b c - d`e f, `.- Where, - b, Original Fixed Request Weight (by default set as 1). -- ^_.<, Threshold Request Rate or average request burst time. -` AB,, Previous Request Rate at time _, where ;<, is binomial function. BC -h, Reduction Factor, configure by system. We require that, h21 means h is greater, smaller the weight. With help of using request weight coefficient, we have to balancing load on basis of LWL and MWL with RR, WFQ or APFQ [11] like scheduling algorithm to transmit request to their particular state processing with following State-Rank. E. Speedup( ) Lemma-2: Given the accuracy requirement described above in Section-V and N be the number of request sample in CSRT is required for ESRATE- < ij\k,almnopqr W X L CY L (2)

7 Let us define the request rate amplification factor [16] for the rate change of data item before and after the Matching as- \ stuv \ wuxvu (3) Lemma-3: Given the accuracy requirement described in Section-V. < ij\k,almnopqr be the number of request samples required for ESRATE-CSRT(Matching) and < jkk,pymzpqr be the number of request samples required for ESRATE- SPT(Filtering). As well as < {\k,{lpqpqr be the number of request samples required for ESRATE-DRT (Draining). < jkk,pymzpqr = B }~, st ƒ L (4) < jkk,pymzpqr = B }~, st ƒ JB x vsƒ ƒ ˆ (5) As well as < k {lpqpqr be the number of request samples required for Draining.Therefore we have speedup of the detection (Matching, Filtering, and Draining) process even with Š _Œ on rate amplification factor due to historical information filtering. F. Memory Requirement Now we focus on the memory requirement for ESRATE. The memory requirement for the estimation scheme is proportional to the size of this subset of data items for which request rate and request weight coefficient are maintained. We therefore use the number of data items for which counts are maintained as surrogate for the memory requirement. So, we calculate the worst case expected memory requirement due to dependencies of comparisons. Given the request sample size N. In other words, we want to find an allocation of P that maximize the expected number of data item in CSRT- Lemma-4: Given the specified accuracy requirement for the maximum expected memory [14] in both states are- Proof: where, Ÿ = 4 œ7 8 5 =. ˆ Š_ ^ Š _Š_, [ (<)] 1.174@ X L ˆ Š_ š*_* Š _Š_, [ (<)] 1.174@ W X L œ7 8 5 = Y L L (6) [ (<)] X L 5d œ7 L 8 5 = (7) V. PERFORMANCE CRITERIA Through the evaluation, we target to answer a few questions arise from some technical misconception of Workload Factoring and traffic estimation over network through incoming requests for web services. A. Observation Tracery As observed analysis, dedicated runtime implementation of ESRWF scheme is developed through Tri-Way Trajectory Simulations as implemented part of proposed Integrated Cloud Computing Model described in fig.3 which may enhance the TestBed experiment of [16]. Yes, it is hard to obtain analytic results for the performance of ESRWF under a stochastic environment. To evaluate the behavior of ESRWF and efficiency of ESRATE in such an environment we use simulation results. We conduct the simulation tool using the CloudSim & GridSim-5.2 with network simulation tool OPNET Modeler 14.0 and for transmitting the request use the base line for applying the algorithm APFQ. Our simulation implementation includes the APFQ code without modifying it. The implementation collects the statistics for each data item every second (simulation time) in CSRT, sums up the offered traffic load of requests during a sliding window, and updates the request rate and request weight coefficient.

8 Available Online at ISSN (a) (b) Figure 4. (a) Customer viewed stream quality at both system states (b) Customer viewed stream quality at both system states on experimental setup- Tri-Way Trajectory Simulation Now for active tracery, we used the Yahoo! Video (India) [8], is 3 rd ranked online video website just after YouTube and MetaCafe in terms of total number of video views, uploading & downloading during January 2011, delivered totally 30.2 millions of video streams to million of unique Indian viewers [3]. It is 72% of the online population of India who take services of video streaming. We trace the Yahoo! Video site for 2 months (from January 11 to March 12, 2012), and the data was collected in every 30 minutes to 1 hour. Due to large scale of Yahoo! Video site, we limited the data collection to the first 10 pages of each category. Since each page contains 10 video objects, each time the measurement collects dynamic workload information for 1230 video files in total. Throughout the whole collection period, we recorded 2,843 unique videos which durations range from 2 to 6350 seconds and a total of 1,755,186 video views. This can be translated into a daily video request rate of There is nearly dissimilarity in statistics to calculate mean duration between sites. B. Requests Concurrency at servers Fig.4(b) shows the viewed stream quality from stream resources of Regular State (LDC Server) and stream resources of Critical State (Cloud Server) in the particular Workload Factoring experiment. For informal comparison, in this case both state servers have the typical configuration & proficiency. We observed that the concurrent connections went up; the Critical State server delivered more reliable streaming proficiency than the Regular State server. It could corroborate 175 concurrent stream connections whereas keeping the Customer-side proficiency at above 80, whereas the Regular State server could only corroborate around 87 average concurrent stream connections to keep the Customer-sided quality steadily at above 90. See fig.5(a), for allocated bandwidth for particular served requests. In the Tri-Way Trajectory Simulation we set the Regular State server capacity at 90 concurrent connections and that for Critical State servers at 170. Due to this Workload Factoring mechanism, we observed that the ratio of the maximum load to the average load was reduced to 1.94 in the Regular State and streaming proficiency at Critical State processing is 95% more than that in the Regular State processing. 1349

9 (a) (b) Figure 5. (a) Requests serve through ESRWF at both system states (b) Workload factoring performance: Memory Cost for ESRWF C. Minimizing Data Cache and Replication Overhead Linear approach of data accessing, prediction, servicing, caching, requesting and drain or dispatching through which our Workload Factoring scheme reduces data cache and replication overhead. It brings multiple and multitask benefits on author s model & have effective job & performance in Critical State. Yes, In Critical State data storage hierarchies & their levels of features based on ILMs be designed as a data cache. And disengage from Regular State through short extreme activated application of data accessing. Taking prediction of incoming requests for particular data item & their related request rate proportion through which system servicing with speeding up the dynamic provisioning process at LDC or runtime Server in Cloud; cached data can enlarge the capacity for particular runtime server for momentary relaxation. After applying drain or dispatching, only small sized request of data item will be requested. Also, apply WFQ-APFQ [11], Least Connections or RR type load balancing schemes [10] as well as make use of and derive benefit from content locality which based on High Workload based Dispatching. As a prior think is that to see fig.6(b), this technique leads only best resource planning & management appeal with comparison of IWF (Intelligent Workload Factoring) [16], which perform better in each case and may improve the quality of the IWF. D. Memory Cost & Predictions As comparison, unlike RATE [19], CATE [14] and Fast Top-k [16]; ESRATE is most accurate and fastest uses less memory to follow the request migration policy of Extreme State-Rank based Workload Factoring Scheme but addition of memory prediction estimation Ÿ at certain level due to system state through which scheme is more complicated and have desired high accuracy with sufficient ample stock of memory at Critical State. So, such dynamic tenancy of memory is effective runtime example of creation, storing & processing of memory block according to provisioning of incoming request. As fig.5(b) & fig.6(a), we also note that ESRATE use the typical amount of memory by the time they capture all medium-sized requests, which signifies that they need less memory size for estimation accuracy at both states.

10 (a) (b) Figure 6. (a) Desired Accuracy performed by ESRATE (b) Workload Handling Strategy managed by IWF & ESRWF E. Economical Tendency We give an ESRWF based application hosting solutions to host the measured Yahoo! Video stream load. In this solution, a local data center is over provisioned over regular workload (96.4%), and cloud based platform such as Amazon EC2 [1] is rented on high demand for critical workload (3.6%). It offers an economical solution for green Cloud Computing environment with 65-server oriented tiny local data center with 15-server oriented Drain Resolver and an annual rent for managing critical workload is approximately $42.56K only. As formality, we only include the server cost only though so many factors which influence the server cost had been neglected. We measure the application hosting solution for Yahoo! Video stream loads according to Methodology of [8]. Fig.4(a) shows the unique video requested by customer were viewed & served only 23 out of 5000 video streams in Critical State. TABLE I. PERFORMANCE CRITERIA OF ESRWF Hosting Platform Issues Unique Video Requested Equipment Required Annual Costs Requests Concurrency Solutions through ESRWF 23 unique video clips 65-server LDC + 15-Drain Resolver USD 42.56K approx. 90 at Regular & 175 at Critical State Ratio of max load to avg load 1.94 Resource Proficiency =95% Data Cache & Replication Overhead Minimized up to three orders of magnitude VI. CONCLUSIONS & FUTURE WORKS In this paper, we present the design of an Extreme State-Rank based Integrated Cloud Computing Model. For the future work, extending the Integrated Cloud Computing Model to stateful & provision based applications such as n-tier web services is a natural and challenging step. Many new problems arise such as session maintenance, service time estimation, and data consistency due to data dispatching in different states to process, fast data on demand service, integrating the dynamic web service scaling approach in our system; even there are many concepts missed for discussion such as load balancing schemes in states, data replication & consistency management in the Critical State, security management for an integrated cloud platform, and more. We have shown through both theoretical analyses of Observation Tracery and Tri-Way Trajectory Simulations that ESRATE is fast and memory-efficient. It estimates small data items very quickly and accurately, and still gives good estimation accuracy for large data items. Dependence within request arrivals may affect the estimation accuracy. Although the buffer-based approach can

11 alleviate the problem, a better approach that can further minimize the impact of dependence without additional overhead may be more preferable. We attempt to address this issue as part of future work also. With the proposed Workload Factoring technology and creating Drain Resolver Architecture & solutions, which gives the elastic natural environment for the green cloud infrastructure as means of resource planning, it develops a situation where cloud resources are used as supplementary extension of existing unable infrastructure to handle high workloads. It's not an all or nothing decision; companies can effort into the cloud without leaving permanently established infrastructure and applications. REFERENCES [1] Amazon web services, [2] Amazon, [3] ComScore Video Metrix report: India Viewers Watched an Average of 3 Hours of Online Video in July, Available: [4] Darwin streaming server, Available: [5] Google App Engine, [6] Openrtsp, Available: [7] Vmware cloud vservices, Available: [8] Yahoo! Video, [9] R. Pan, B. Prabhakar, and K. Psounis, Choke - a stateless active queue management scheme for approximating fair bandwidth allocation, in INFOCOM Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, 2000, pp Available: [10] A. Kumar, M. Sung, J. xu, and J. Wang, Data streaming algorithms for efficient and accurate estimation of flow distribution, in Proc. Of ACM SIGMETRICS, June 2004, to appear. [11] Anat Bremler-Barr, Nil Halachmi, Hanoch Levy, Aggressiveness protective Fair Queuing for Bursty Applications. Available: [12] Anthony T. Valte, Toby J. Valte, Robert Elsenpeter. Cloud Computing: A Practical Approach. Tata McGraw-Hill Edition 2010, 6 th Reprint. [13] Dr. Kumar Saurabh, Cloud Computing: Insights into New Era Infrastructure. WILEY-INDIA, First Edition [14] F. Hao, M. S. Kodialam, T. V. Lakshman, and H. Zhang, Fast, memory-efficient traffic estimation by coincidence counting. In INFOCOM, 2005, pp [15] G. Karypis and V. Kumar, Multilevel k-way hypergraph partitioning, in DAC 99: Proceedings of the 36th ACM/IEEE conference on Design automation. New York, NY, USA: ACM, 1999, pp [16] H. Zhang, G. Jiang, K. Yoshihira, H. Chen, and A. Saxena, Intelligent workload factoring for a hybrid Cloud Computing model, NEC Labs America Technical Report 2009-L036, Feb [17] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view of cloud computing, EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS , Feb [Online]. Available: /TechRpts/2009/EECS html [18] M. Arregoces and M. Portolani, Data Center Fundamentals, Cisco Press, [19] M. Kodialam, T. V. Lakshman, and S. Mohanty, "Runs based Traffic Estimator (RATE): A simple, Memory Efficient Scheme for Per- Flow Rate Estimation", Proceedings of INFOCOM'2004.

Intelligent Workload Factoring for A Hybrid Cloud Computing Model

Intelligent Workload Factoring for A Hybrid Cloud Computing Model Intelligent Workload Factoring for A Hybrid Cloud Computing Model Hui Zhang, Guofei Jiang, Kenji Yoshihira, Haifeng Chen and Akhilesh Saxena NEC Laboratories America Princeton, NJ 08540 Emails: {huizhang,gfj,kenji,haifeng,saxena@nec-labs.com}

More information

Intelligent Workload Factoring for A Hybrid Cloud Computing Model

Intelligent Workload Factoring for A Hybrid Cloud Computing Model 2009 Congress on Services - I Intelligent Workload Factoring for A Hybrid Cloud Computing Model Hui Zhang, Guofei Jiang, Kenji Yoshihira, Haifeng Chen and Akhilesh Saxena NEC Laboratories America Princeton,

More information

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems

A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems A Hybrid Scheduling Approach for Scalable Heterogeneous Hadoop Systems Aysan Rasooli Department of Computing and Software McMaster University Hamilton, Canada Email: rasooa@mcmaster.ca Douglas G. Down

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Cost-effective Partial Migration of VoD Services to Content Clouds

Cost-effective Partial Migration of VoD Services to Content Clouds 211 IEEE 4th International Conference on Cloud Computing Cost-effective Partial Migration of VoD Services to Content Clouds Haitao Li, Lili Zhong, Jiangchuan Liu,BoLi,KeXu, Simon Fraser University, Email:

More information

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE

IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE IMPROVED FAIR SCHEDULING ALGORITHM FOR TASKTRACKER IN HADOOP MAP-REDUCE Mr. Santhosh S 1, Mr. Hemanth Kumar G 2 1 PG Scholor, 2 Asst. Professor, Dept. Of Computer Science & Engg, NMAMIT, (India) ABSTRACT

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

Improving MapReduce Performance in Heterogeneous Environments

Improving MapReduce Performance in Heterogeneous Environments UC Berkeley Improving MapReduce Performance in Heterogeneous Environments Matei Zaharia, Andy Konwinski, Anthony Joseph, Randy Katz, Ion Stoica University of California at Berkeley Motivation 1. MapReduce

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Discovery 2015: Cloud Computing Workshop June 20-24, 2011 Berkeley, CA Introduction to Cloud Computing Keith R. Jackson Lawrence Berkeley National Lab What is it? NIST Definition Cloud computing is a model

More information

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing

Performance Analysis of VM Scheduling Algorithm of CloudSim in Cloud Computing IJECT Vo l. 6, Is s u e 1, Sp l-1 Ja n - Ma r c h 2015 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Performance Analysis Scheduling Algorithm CloudSim in Cloud Computing 1 Md. Ashifuddin Mondal,

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore

More information

Analysis of Service Broker Policies in Cloud Analyst Framework

Analysis of Service Broker Policies in Cloud Analyst Framework Journal of The International Association of Advanced Technology and Science Analysis of Service Broker Policies in Cloud Analyst Framework Ashish Sankla G.B Pant Govt. Engineering College, Computer Science

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

A Sequential Game Perspective and Optimization of the Smart Grid with Distributed Data Centers

A Sequential Game Perspective and Optimization of the Smart Grid with Distributed Data Centers A Sequential Game Perspective and Optimization of the Smart Grid with Distributed Data Centers Yanzhi Wang, Xue Lin, and Massoud Pedram Department of Electrical Engineering University of Southern California

More information

High performance computing network for cloud environment using simulators

High performance computing network for cloud environment using simulators High performance computing network for cloud environment using simulators Ajith Singh. N 1 and M. Hemalatha 2 1 Ph.D, Research Scholar (CS), Karpagam University, Coimbatore, India 2 Prof & Head, Department

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS Survey of Optimization of Scheduling in Cloud Computing Environment Er.Mandeep kaur 1, Er.Rajinder kaur 2, Er.Sughandha Sharma 3 Research Scholar 1 & 2 Department of Computer

More information

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Keywords: Big Data, HDFS, Map Reduce, Hadoop

Keywords: Big Data, HDFS, Map Reduce, Hadoop Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Configuration Tuning

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD

LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD LOAD BALANCING IN CLOUD COMPUTING USING PARTITIONING METHOD Mitesh Patel 1, Kajal Isamaliya 2, Hardik kadia 3, Vidhi Patel 4 CE Department, MEC, Surat, Gujarat, India 1 Asst.Professor, CSE Department,

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

A Proposed Case for the Cloud Software Engineering in Security

A Proposed Case for the Cloud Software Engineering in Security A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,

More information

Optimal Multi Server Using Time Based Cost Calculation in Cloud Computing

Optimal Multi Server Using Time Based Cost Calculation in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International

More information

Secured Storage of Outsourced Data in Cloud Computing

Secured Storage of Outsourced Data in Cloud Computing Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated

More information

Guidelines for Selecting Hadoop Schedulers based on System Heterogeneity

Guidelines for Selecting Hadoop Schedulers based on System Heterogeneity Noname manuscript No. (will be inserted by the editor) Guidelines for Selecting Hadoop Schedulers based on System Heterogeneity Aysan Rasooli Douglas G. Down Received: date / Accepted: date Abstract Hadoop

More information

Optimizing the Cost for Resource Subscription Policy in IaaS Cloud

Optimizing the Cost for Resource Subscription Policy in IaaS Cloud Optimizing the Cost for Resource Subscription Policy in IaaS Cloud Ms.M.Uthaya Banu #1, Mr.K.Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional Centre

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Copyright IEEE. Citation for the published paper:

Copyright IEEE. Citation for the published paper: Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products

More information

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer

The Hidden Extras. The Pricing Scheme of Cloud Computing. Stephane Rufer The Hidden Extras The Pricing Scheme of Cloud Computing Stephane Rufer Cloud Computing Hype Cycle Definition Types Architecture Deployment Pricing/Charging in IT Economics of Cloud Computing Pricing Schemes

More information

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012), PP 141-147 Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm 1 Sourav Banerjee, 2 Mainak Adhikari,

More information

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications

IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive

More information

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud

Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more

More information

Load Balancing of Web Server System Using Service Queue Length

Load Balancing of Web Server System Using Service Queue Length Load Balancing of Web Server System Using Service Queue Length Brajendra Kumar 1, Dr. Vineet Richhariya 2 1 M.tech Scholar (CSE) LNCT, Bhopal 2 HOD (CSE), LNCT, Bhopal Abstract- In this paper, we describe

More information

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

Agent-Based Pricing Determination for Cloud Services in Multi-Tenant Environment

Agent-Based Pricing Determination for Cloud Services in Multi-Tenant Environment Agent-Based Pricing Determination for Cloud Services in Multi-Tenant Environment Masnida Hussin, Azizol Abdullah, and Rohaya Latip deployed on virtual machine (VM). At the same time, rental cost is another

More information

On-line Scheduling of Real-time Services for Cloud Computing

On-line Scheduling of Real-time Services for Cloud Computing On-line Scheduling of Real-time Services for Cloud Computing Shuo Liu Gang Quan Electrical and Computer Engineering Department Florida International University Miami, FL, 33174 {sliu5, gang.quan}@fiu.edu

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing

A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing A Comparative Study on Load Balancing Algorithms with Different Service Broker Policies in Cloud Computing Sonia Lamba, Dharmendra Kumar United College of Engineering and Research,Allahabad, U.P, India.

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

Survey On Cloud Computing

Survey On Cloud Computing Survey On Cloud Computing 1,2 Heena I. Syed 1, Naghma A. Baig 2 Jawaharlal Darda Institute of Engineering & Technology, Yavatmal,M.S., India. 1 kauser.heena853@gmail.com 2 naghmabaig@gmail.com Abstract

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Load balancing as a strategy learning task

Load balancing as a strategy learning task Scholarly Journal of Scientific Research and Essay (SJSRE) Vol. 1(2), pp. 30-34, April 2012 Available online at http:// www.scholarly-journals.com/sjsre ISSN 2315-6163 2012 Scholarly-Journals Review Load

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

The Probabilistic Model of Cloud Computing

The Probabilistic Model of Cloud Computing A probabilistic multi-tenant model for virtual machine mapping in cloud systems Zhuoyao Wang, Majeed M. Hayat, Nasir Ghani, and Khaled B. Shaban Department of Electrical and Computer Engineering, University

More information

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems

Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,

More information

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing , pp.9-14 http://dx.doi.org/10.14257/ijgdc.2015.8.2.02 Efficient and Enhanced Load Balancing Algorithms in Cloud Computing Prabhjot Kaur and Dr. Pankaj Deep Kaur M. Tech, CSE P.H.D prabhjotbhullar22@gmail.com,

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: 1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

More information

Abstract. 1. Introduction

Abstract. 1. Introduction A REVIEW-LOAD BALANCING OF WEB SERVER SYSTEM USING SERVICE QUEUE LENGTH Brajendra Kumar, M.Tech (Scholor) LNCT,Bhopal 1; Dr. Vineet Richhariya, HOD(CSE)LNCT Bhopal 2 Abstract In this paper, we describe

More information

How To Understand Cloud Computing

How To Understand Cloud Computing International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol4, Issue3, 2013, pp234-238 http://bipublication.com CURRENT SCENARIO IN ARCHITECT AND APPLICATIONS OF CLOUD Doddini

More information

An Approach to Load Balancing In Cloud Computing

An Approach to Load Balancing In Cloud Computing An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

Data Center Energy Cost Minimization: a Spatio-Temporal Scheduling Approach

Data Center Energy Cost Minimization: a Spatio-Temporal Scheduling Approach 23 Proceedings IEEE INFOCOM Data Center Energy Cost Minimization: a Spatio-Temporal Scheduling Approach Jianying Luo Dept. of Electrical Engineering Stanford University jyluo@stanford.edu Lei Rao, Xue

More information

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose

A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India

More information

Enable Public Audit ability for Secure Cloud Storage

Enable Public Audit ability for Secure Cloud Storage Enable Public Audit ability for Secure Cloud Storage Leela Poornima 1, D.Hari Krishna 2 1 Student, Nova College of Engineering and Technology, Ibrahimpatnam,Krishna Dist., Andhra Pradesh, India 2 Assistant

More information

Where Do You Tube? Uncovering YouTube Server Selection Strategy

Where Do You Tube? Uncovering YouTube Server Selection Strategy Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing

More information

Efficient DNS based Load Balancing for Bursty Web Application Traffic

Efficient DNS based Load Balancing for Bursty Web Application Traffic ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

Conceptual Approach for Performance Isolation in Multi-Tenant Systems

Conceptual Approach for Performance Isolation in Multi-Tenant Systems Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and

More information

A REVIEW ON LOAD BALANCING TECHNIQUE IN THE PUBLIC CLOUD USING PARTITIONING METHOD

A REVIEW ON LOAD BALANCING TECHNIQUE IN THE PUBLIC CLOUD USING PARTITIONING METHOD A REVIEW ON LOAD BALANCING TECHNIQUE IN THE PUBLIC CLOUD USING PARTITIONING METHOD 1 G. DAMODAR, 2 D. BARATH KUMAR 1 M.Tech Student, Department of CSE. gdyadav509@gmail.com 2 Assistant Professor, Department

More information

A Comparative Study of Load Balancing Algorithms in Cloud Computing

A Comparative Study of Load Balancing Algorithms in Cloud Computing A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,

More information

Hadoop in the Hybrid Cloud

Hadoop in the Hybrid Cloud Presented by Hortonworks and Microsoft Introduction An increasing number of enterprises are either currently using or are planning to use cloud deployment models to expand their IT infrastructure. Big

More information

VMware on VMware: Private Cloud Case Study Customer Presentation

VMware on VMware: Private Cloud Case Study Customer Presentation VMware on VMware: Private Cloud Case Study Customer Presentation 2009 VMware Inc. All rights reserved Agenda VMware IT landscape Motivations for the Cloud Private Cloud Stack Impact of moving to the Cloud

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Geoprocessing in Hybrid Clouds

Geoprocessing in Hybrid Clouds Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;

More information

Design of Simulator for Cloud Computing Infrastructure and Service

Design of Simulator for Cloud Computing Infrastructure and Service , pp. 27-36 http://dx.doi.org/10.14257/ijsh.2014.8.6.03 Design of Simulator for Cloud Computing Infrastructure and Service Changhyeon Kim, Junsang Kim and Won Joo Lee * Dept. of Computer Science and Engineering,

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES

USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES Carlos Oliveira, Vinicius Petrucci, Orlando Loques Universidade Federal Fluminense Niterói, Brazil ABSTRACT In

More information

Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems

Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems 215 IEEE International Conference on Big Data (Big Data) Computing Load Aware and Long-View Load Balancing for Cluster Storage Systems Guoxin Liu and Haiying Shen and Haoyu Wang Department of Electrical

More information

Realizing the Value Proposition of Cloud Computing

Realizing the Value Proposition of Cloud Computing Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need

More information

Load Balancing in Distributed Web Server Systems With Partial Document Replication

Load Balancing in Distributed Web Server Systems With Partial Document Replication Load Balancing in Distributed Web Server Systems With Partial Document Replication Ling Zhuo, Cho-Li Wang and Francis C. M. Lau Department of Computer Science and Information Systems The University of

More information

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers

Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers 1 Proxy-Assisted Periodic Broadcast for Video Streaming with Multiple Servers Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of

More information

Int. J. Advanced Networking and Applications 1367 Volume: 03, Issue: 05, Pages: 1367-1374 (2012)

Int. J. Advanced Networking and Applications 1367 Volume: 03, Issue: 05, Pages: 1367-1374 (2012) Int. J. Advanced Networking and Applications 1367 s to Improve Resource Utilization and Request Acceptance Rate in IaaS Cloud Scheduling Vivek Shrivastava International Institute of Professional Studies,

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

Auto-Scaling, Load Balancing and Monitoring As service in public cloud

Auto-Scaling, Load Balancing and Monitoring As service in public cloud IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 4, Ver. I (Jul-Aug. 2014), PP 39-46 Auto-Scaling, Load Balancing and Monitoring As service in public

More information

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable

More information

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com

The International Journal Of Science & Technoledge (ISSN 2321 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Efficient Parallel Processing on Public Cloud Servers using Load Balancing Manjunath K. C. M.Tech IV Sem, Department of CSE, SEA College of Engineering

More information