Framework and User Migration Strategy of Cloud-Based Video Conference Multi-Gateway System

Size: px
Start display at page:

Download "Framework and User Migration Strategy of Cloud-Based Video Conference Multi-Gateway System"

Transcription

1 Framework and User Migration Strategy of Cloud-Based Video Conference Multi-Gateway System Hongen Feng 1, Wenjun Wu 2 1,2 State Key Lab of Software Development Environment School of Computer Science and Engineering, Beihang University Beijing, China fenghongen@nlsde.buaa.edu.cn, wwj@nlsde.buaa.edu.cn Abstract In video conference system, the multimedia gateway plays an important role in forwarding audio and video data, whose performance is a bottleneck of the system. A flexible framework of cloud-based video conference multi-gateway system is proposed to meet the needs of a high-definition video conference system, which can control a variety of virtual gateway resources based on physical devices, thus multimedia gateways can be deployed dynamically. In addition, a real-time user migration strategy is designed and implemented based on the framework, which combines active pattern with passive pattern. The experiments show that the user migration strategy could control the time delay of user migration under 65 milliseconds, ensure the continuity of audio and video data during user migration, and successfully solve the reliability problems caused by system shutdown or overload of the multimedia gateway. Keywords-cloud computing; multi-gateway system; user migration strategy I. INTRODUCTION A multimedia video conference is the real-time exchange of media data among several parties, which breaks the limit of human communications due to the geographical location of participants. Recent advances in broadband communication and computing technology have accelerated the proliferation of multimedia conferencing services in large-scale enterprises, and a high quality multimedia conferencing has been an urgent requirement these years. However, the products in the market are immature, and they cannot support a large number of participants and multiple HD videos in a meeting. Meanwhile, cloud computing [1]-[4], a new thing which is only five years old, becomes the most fashionable technology and developing trend in IT industry now. As a result, it is a popular topic for blogging and white papers and has been featured in the title of workshops, conferences, and even magazines. There is no standard formal definition of cloud computing, broadly speaking, cloud computing is an architecture where IT resources (compute, storage, platforms, applications and services) are pooled and delivered to the users on-demand without strict dedicated association of customers and resources. The services of Cloud computing can be divided into three main categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). In video conference system, multimedia gateway plays an important role in forwarding audio and video data. Most conference models are built on a single centralized conference server, which has only one multimedia gateway, for the effective control of the multimedia conference, but the centralized conferencing server model is not suitable for a large-scale multimedia communication environment since it may have problems of triangular transmission, possible communication bottleneck due to the traffic concentration to the server, and large processing overload at the server, which has seriously affected the expansion of system scale. In this paper, we have taken full advantage of the outstanding performance of cloud computing, and presented a new highly scalable cloud-based multiple-gateway architecture for the efficient management of large-scale multimedia conferencing service. This architecture has not only realized the expansion from single-gateway to multi-gateway but also achieved a harmonious combination of multi-gateway and cloud computing technologies. What s more, this architecture overcomes the limitations of the tightly coupled conference model and has excellent characteristics, such as scalability and reliability. One of the important issues for multi-gateway video conference is to enhance the reliability of conference control architecture. The large-scale conference service usually involves a large number of diverse media devices and multiple gateway servers, which are usually geographically dispersed. Furthermore, a large number of participants are usually involved in a conference from dispersed regions, they can be dynamically joining and leaving the conference at any time, and the amount of audio and video data that each user sends and receives is usually different. All the aforementioned factors might make the load of each gateway unequal, even some gateways can t be normally forwarding audio and video data due to overloading, and the user migration strategy is an effective means to solve such overloading problems. With the continuous promotion of cloud computing, reliability issues have surfaced. In 2011, a large portion of Amazon s EC2 cloud-computing service had big problems, causing downtime for a lot of popular websites that rely on it. Therefore, reliability is a key factor that decides whether or not cloudbased video conference could advance smoothly, and user migration strategy is an effective method of solving such /12/$ IEEE

2 downtime problems. In this article, we have implemented a user migration strategy based on the cloud-based multigateway framework mentioned previously, which combines active pattern with passive pattern. This strategy can solve the reliability problems caused by overload or downtime successfully, thus improving the quality of service. II. RELATED WORKS The researchs on the frameworks of video conference system have been done for many years, which can be divided into three main categories: centralized conference system, fully distributed conference system and loose multicast conference system. They each have different data-forwarding strategy. In the centralized conference system [5][6], the overall conference control is accomplished by a centralized control server, so that the conference can be managed more effectively. However, the system has only one multimedia gateway, which could stand limited data forwarding pressure. So the system has limitations in scalability and its management of a large-scale enterprise conferencing service. The fully distributed system is usually conceived as an extension to a standard centralized conferencing framework [7]- [10], under definition inside the IETF XCON working group. Basically, it envisages the construction of an overlay network acting as glue between a number of centralized conference islands, and each island owns a multimedia gateway. The system usually uses a complex optimal path selection strategy to obtain a better data forwarding effect, which makes the system more difficult to implement. Compared with the centralized one, the fully distributed architecture expands the scale of the meeting, but there are also many shortcomings in this architecture: weak control function, using non-standard protocols, poor adaptability and poor robustness. In the loose multicast conference system, communication between conference participants is accomplished by using the IP multicast protocols. The major drawback of a loose multicast conference system is known to the lack of centralized control for the conference and weaknesses in security. The IETF working group has studied this loosely coupled conference management using the IP multicast protocols, but these efforts have been abandoned due to the absence of a widely available multicast service on Internet and the above mentioned drawbacks. At the end of this section, we introduce ADMIRE video conference system [11], from which the framework and strategy proposed in this paper are derived. ADMIRE is a pure-software multimedia real-time collaboration platform developed by State Key Laboratory of Software Development Environment of Beihang University, which supports multi-user real-time audio and video interaction, desktop and application sharing, electronic whiteboard, text chat, etc. ADMIRE is a centralized conference system, which also suffers extended problems. It has a TCP-based communication mechanism named Mbus, which realizes light-load and message-oriented communication among the various components of the system. III. SYSTEM ARCHITECTURE In this section, we describe the integrated structure of the cloud-based multi-gateway system, and list the advantages of the framework. The architecture is designed based on both cloud computing technology and the original architecture model of ADMIRE. We propose the cloud-based architecture for high performance multimedia data processing, which can control a variety of virtual resources based on some physical devices and dynamically configure computing power of the entire cluster. There are three central roles in the proposed architecture: Multi-gateway cloud controller (MGCC), multigateway node controller (MGNC) and virtual gateway node (VGN). The architecture is shown in Fig. 1. Figure 1. Cloud-based video conference multi-gateway system In addition, there are still some other traditional video conference modules in the same node with the MGCC, and we identify them with dashed box in Fig. 1. These modules implement some basic functions, such as user management, text chat, application sharing, etc, and we no longer make further description about them. A. Multi-gateway cloud controller MGCC is an entry-point into the cloud system for users and administrators. It s the key management module of the platform, which keeps track of cloud resources, makes scheduling decisions, forwards user requests to MGNCs that host user services and maintain user and system related data. Users are only allowed to interact with the MGCC and cannot communicate with any MGNC directly. As a result users have

3 no information about the node and its configuration on which VMs will run. The MGCC has three main architectural components, which includes: gateway-controlling component, resource-managing component, web service component. 1) Gateway-controlling component The gateway-controlling component has four key functions. a) When an user logins, the gateway-controlling component performs a static load balancing strategy, which uses a hash function to map the user s public IP address to a multimedia gateway, to assign a reasonable access gateway to the user. The strategy not only shortens the time delay during multimedia data forwarding, but also achieves a balanced distribution of resources. b) The gateway-controlling component maintains the information of each multimedia gateway, which includes the existence state and load of each multimedia gateway. c) The gateway-controlling component could response to the user migration requests sent by multimedia gateways. During a video conference, multimedia gateways might send user migration requests to the gateway-controlling component due to overload, then the gateway-controlling component migrates part of the users to other normal multimedia gateways. d) The gateway-controlling component controls the resources of the entire system by sending resource-controlling commands to the resource-managing component. There are two kinds of resource-controlling commands, one is to create a new virtual gateway node due to more need of data forwarding capability, the other is to merge some of the running virtual gateway nodes due to the existence of more than one low-load multimedia gateways. 2) Resource-managing component The resource-managing component performs system-wide arbitration of resource allocations and monitors resources. It also processes VM-controlling requests and interacts with MGNCs to effect the allocation and deallocation of physical resources. A simple representation of the system s resource state (SRS) is maintained through communication with the MGNCs and used in evaluating the realizability of user requests. The SRS tracks the state of resource allocations and is the source of authority of changes to the properties of running reservations. The role of the SRS is executed in a specific situation: when user requests arrive, the information in the SRS is relied upon to make an admission control decision (e.g., VM creation and VM destruction). The MGNC then responds to the control command, processing VM managing operations. 3) Web service component In addition to the programmatic interface, the framework also offers a web interface for cloud users and administrators, which is implemented by a web service component. Using a Web browser, users can sign up for cloud access, query the system and logon the VM with a special account. Administrators can, additionally, inspect the availability of system resources and the load of each VM, and control the VMs. B. Multi-gateway node controller A multi-gateway node controller executes on every node that is designated for hosting VM instances, and each area may comprise more than one MGNCs. An MGNC queries and controls the system software on its node (e.g., the host operating system and the hypervisor) in response to queries and control requests from its MGCC. MGNC obtains list of VM instances and change the state (e.g., starting, running, suspending) of them with the help of VM Hypervisor. Currently, we support VMs that run atop Hyper-v hypervisor, but plan to add support for VMware, Xen, and others in the near future. The MGNC has two central components, which includes: resource-monitoring component and VM-controlling component. 1) Resource-monitoring component The resource-monitoring component makes queries to monitor the usage of the node s physical resources as well as to learn about the state of VM instances on the node (although a MGNC keeps track of the instances that it controls, instances may be started and stopped through mechanisms beyond MGNC s control). The information thus collected is propagated up to the MGCC in responses to resource describing requests. 2) VM-controlling component The VM-controlling component executes runinstance, terminateinstance and suspendinstance with the assistance of the hypervisor to respond the VM-controlling command made by MGCC. There are usually three steps during VM creation: (1) copy a VM instance image (the kernel, gateway application and other applications) from local node; (2) configure network of the VM, including IP address allocation and firewall configuration; (3) start a VM instance with the help of the hypervisor. To stop an instance, the VM-control component instructs the hypervisor to terminate the VM, tears down the virtual network endpoint, and cleans up the files associated with the VM. C. Virtual gateway node Lots of VGNs, which include multimedia gateways and load-monitoring components, together comprise a huge cluster. The multimedia gateway, which is immobilized on VM instance, has one-to-one relationship with the VM instance. The load-monitoring component monitors the load (CPU usage, available memory, data-receiving rate and data-sending rate) of the node, and regularly sends load information to the gatewaycontrolling component of MGCC. It also has data-analysis ability, which could calculate the mean and variance recorded in a given length of time, and then compare the calculated value with the threshold set by system. If the calculated value is beyond the threshold, the load-monitoring component will send a user migration request to MGCC. D. System properties 1) Usability Some of the system controls and regulation functions, such as the static load-balancing strategy and user migration strategy, are running in an automatic mode so that users can use the same approach with the ordinary video conference software to

4 interact with others, thus avoiding the complexity of software configuration. 2) Scalability The MGCC could dynamically change the number of multimedia gateways to meet users data forwarding demand in real-time. This property not only provides the entire system with a good expansibility, but also reduces energy consumption by merging some low-load multimedia gateways. 3) Reliability The user migration strategy can successfully solve the reliability problems caused by system shutdown or overload of multimedia gateways, which enhances the reliability of the system. IV. USER MIGRATION STRATEGY A good user migration strategy could migrate the users connected to the overloading multimedia gateway to a normally low-load multimedia gateway, which achieves a dynamic load balancing scheme and enhances the reliability of the system. There are a variety of reasons that cause the multimedia gateway to trigger user migration during a video conference. According to the causes, user migration can be de divided into two kinds: active user migration and passive user migration. In this paper, we design and implement a real-time user migration strategy based on the above mentioned framework, which combines active pattern with passive pattern. Meanwhile, to determine the timing of user migration and to perform the process of user migration are two important links during user migration. A. The timing of user migration Active user migration is caused by overloading of multimedia gateways, while passive user migration is triggered by detecting downtime of multimedia gateways. Therefore, it is very important to choose a reasonable overload judgment and downtime-detecting mechanism to ensure the smooth procedure of user migration. 1) Mechanism to determine overload of the multimedia gateway In multi-gateway video conferencing systems, both datasending rate and data-receiving rate have their certain thresholds due to limitations of the real network, and there will be data loss if the thresholds are exceeded. In addition, normal operations of the multimedia gateway are also affected by VM s CPU usage and memory usage. Therefore, data-receiving rate, data-sending rate, CPU usage and available memory are selected as the load indicators of the multimedia gateway, and we have done a lot of experiments and data analysis to determine the threshold of each indicator. Instructions for the four indicators are shown in Table 1. Some descriptions of the indicators in Table 1 are made as follow: a) The load-monitoring component records the measurement value of each indicator, and the range of recording time is set by measuring cycle. For example, if measuring cycle is equal to 5 seconds, we need to record the load indicator values within the last 5 seconds. b) Measuring mean and measuring variance are calculated from the actual measuring values of loadmonitoring component. c) Overload conditions are the basis for deciding whether a load indicator has exceeded its threshold. AveT X and VarT X are the mean threshold and variance threshold set by system, which are obtained from lots of experiments and data analysis. VM s CPU usage and available memory usually change slowly, whose measurement values experience small fluctuations in a measuring cycle, so their measuring means are enough to decide whether the multimedia gateway has overloaded. TABLE I. load indicator data-receiving rate data-sending rate INSTRUCTIONS FOR THE LOAD INDICATORS OF THE MULTIMEDIA GATEWAY measuring cycle measuring mean measuring variance Cycle Recv Ave Recv Var Recv Cycle Send Ave Send Var Send CPU usage Cycle CPU Ave CPU --- available memeory Cycle Mem Ave Mem --- overload condition Ave Recv> AveT Recv &Var Recv< VarT Recv Ave Send> AveT Send &Var Send< VarT Send Ave CPU> AveT CPU Ave Mem< AveT Mem 2) Downtime-detecting mechanism of the multimedia gateway ADMIRE video conference system has a TCP-based communication mechanism named Mbus. Each component that wants to use Mbus to interact with others must create a Mbus object, and the Mbus Server is responsible for the maintenance of Mbus objects online status. The Mbus server will send clientdrop message to the component when it exits. Thus, when multimedia gateways dropped due to downtime or system failures, the gateway-controlling component could quickly detect the dropped multimedia gateways with the assistance of Mbus communication mechanism. B. User migration process A good user migration process should ensure the continuity of multimedia data stream as well as minimize the time delay so that clients can receive and play streaming video smoothly. Firstly, we design and implement a kind of regular user migration process based on the communication mechanism between multimedia gateway and MGCC during user login. Then an improved user migration process is proposed and implemented after further analysis of the former one, and this improvement has been proved to be very effective according to a large number of experiments. 1) Regular user migration process

5 The regular user migration process proposed in this paper mainly includes the following seven steps. Step 1: Triggering migration. In the active user migration, the load-monitoring component of VGN will send control messages containing the overloading reasons to MGCC when it detects one or more load indicators meet the overload condition, then MGCC will execute user migration operations. In the passive user migration, the gateway-controlling component of MGCC will trigger user migration when it detects downtime of a multimedia gateway. Step 2: Determine the migration objects. First the gatewaycontrolling component of MGCC analyzes the reasons that lead to user migration, and then choose migration objects. The gateway-controlling component will select all the users as migration objects if the user migration reasons are multimedia gateways dropped, CPU usage overload and available memory overload. While some of the users who send or receive multimedia data will be chosen as migration objects if the user migration reasons are data-receiving overload or data-sending overload. Step 3: Select the migration target gateway. We prefer to select the normal running multimedia gateway which is in the same area with the migration source gateway as our target; otherwise we will select the system s default gateway as our target. Step 4: Record the status information. First of all, the gateway-controlling component records login information of each migration object after determining the migration objects. Then the gateway-controlling component sends migration message to each migration object, and the migration object will execute some state recording operations, which mainly include audio and video transceiver state. Step 5: Disconnect connections between the multimedia gateway and the migration object. The multimedia gateway should clean up user data during disconnection in this step. Step 6: Assign a new access gateway for migration objects. The gateway-controlling component assign a new access gateway, selected in step 3, for each migration object according to the information of migration object recorded in step 4. Then the migration target gateway should do some user data generating work to ensure the normal running of the migration objects. Step 7: Restore the state of the migration object. Gatewaycontrolling component sends migration-completing message to the migration object, and the migration object will restore audio and video transceiver state according to the information recorded before user migrating and some other information about the new access gateway. 2) Improved user migration process The improved user migration process is the same with most of the steps of the regular one, which also includes seven steps. The first four steps and the seventh step are the same as the steps of the regular one, where they differ is that the fifth step and the sixth step of the regular one are switched with each other in the improved user migration process. The improved one firstly assigns a new access gateway for migration objects, and then disconnects connections between the multimedia gateway and the migration object. However, this sample switch may cause a client to have two access gateways within a short period, and the client should send media data to two multimedia gateways or receive media data from two multimedia gateways at the same time, so we need to make some changes on both clients and multimedia gateways to enable them to handle the repeated packets, although the duplicate packets are usually very few. This improved user migration process could reduce the time delay during user migration. C. The main challenges and their solutions in realizing a user migration strategy 1) Select an appropriate target gateway for the migration objects There might be more than one low-load multimedia gateways at some point, if a multimedia gateway is randomly selected as a migration target gateway, the migration object and the gateway may be in different areas, which will increase the time delay during data forwarding. In this paper, we add a geographical identification to each multimedia gateway, and prefer to select the low-load multimedia gateway which is in the same area with the migration source gateway as our target gateway, which could reduce the data forwarding delay. 2) Ensure the continuity of multimedia data stream It is very important to ensure the continuity of multimedia data stream during user migration, which is the key to improve user experience. The strategy proposed in this paper firstly assigns a new access gateway for migration objects, secondly disconnects connections between the multimedia gateway and the migration object, which effectively reduces the time delay in the user migration process, thus ensuring the continuity of the multimedia data stream. V. EXPERIMENTS AND DATA ANALYSIS A. Determine the thresholds of multimedia gateway s load indicators In this paper, we adopt a unified approach to obtain the original experimental data. We continuously increase one of the system s load indicators until the multimedia gateway starts to lose packets, then we will record the values of the load indicator within a measuring cycle, and these values are used as our original experimental data, on which we will do a lot of data analysis. Experiment 1: Determine the measuring cycle We set up six different bandwidth conditions, do 10 repeated experiments in each condition, and obtain each load indicator s cycle when the load indicator starts to change radically according to the statistic and analysis for 60 sets of experimental data, as shown in Fig. 2. With reference to Fig. 2, the measuring cycle of datareceiving rate is set to 5s, and the measuring cycle of datasending rate is set to 6s. As CPU usage and available memory both change slowly, we set the measuring cycle of them to 6s according to the experimental observations and experience.

6 50 Times of occurrence Cycle values when the load indicators begin to change radically(s) data-receiving rate data-sending rate Percentage of the average data-sending rate(%) Bandwidth of the virtual machine(mbps) Figure 2. Distribution of the measuring cycle Experiment 2: Determine the thresholds of data-receiving rate s mean and data-sending rate s mean We use the measuring cycle selected in Experiment 1 to intercept each set of experimental data, the length of which is the same as the length of the measuring cycle, and then calculate their means. In order to enhance reliability of the threshold, we select the minimum mean of each bandwidth setting as the basic data to compare with others. Fig. 3 and Fig. 4 show the data comparison results of different bandwidth settings. Percentage of the average data-receiving rate(%) Bandwidth of the virtual machine(mbps) Figure 4. Comparison of data-sending rate s means Experiment 3: Determine the thresholds of data-receiving rate s variance and data-sending rate s variance As is identical with Experiment 2, we select the maximum variance of each bandwidth setting as the basic data to compare with others. Fig. 5 and Fig. 6 show the data comparison results of different bandwidth settings. Variance of data-receiving rate Bandwidth of the virtual machine(mbps) 2.72 Figure 5. Comparison of data-receiving rate s variances Figure 3. Comparison of data-receiving rate s means With reference to Fig. 3, we selected the minimum (97.06%) of various bandwidth settings as the system s minimum percentage of the average data-receiving rate ( MinRP ). Thus we could get the threshold of data-receiving rate s mean at different bandwidth settings by (1). AveTRecv bw represents the bandwidth of VM. bw MinRP (1) Similarly, we could get the threshold of data-sending rate s mean from Fig. 4. Variance of data-sending rate Bandwidth of the virtual machine(mbps) Figure 6. Comparison of data-sending rate s variances

7 The variance reflects data stability in a measuring cycle, and the greater the data-receiving or data-sending rate goes, the larger its volatility becomes. As shown in Fig. 5, with the increasing bandwidth of the virtual machine, the data-receiving rate when packet loss occur increases higher, and its measuring variance becomes larger. Thus we could get the threshold of data-receiving rate s variance at a given bandwidth(x) by (2). Recv VarT BaseVar X BaseBand R (2) VarT Recv, BaseBand, BaseVar, R are the threshold of data-receiving rate s variance, reference bandwidth, reference variance and variance increment coefficient. In this article, we select 5Mbps as our reference bandwidth, the maximum variance (14.38) of which is selected as the reference variance, as shown in Fig. 5. The variance increment coefficient varies in different bandwidth range. In order to enhance reliability, we select the maximum value (3.75) as our system s variance increment coefficient, as shown in Fig.5. Similarly, we get the threshold of data-sending rate s variance from Fig. 6. Experiment 4: Determine the threshold of CPU usage s mean We do 10 repeated experiments to determine the threshold of CPU usage s mean. Fig. 7 shows a comparison of the CPU usage s mean in each experiment, and we finally choose the minimum CPU usage s mean (95.86%) as the system threshold of CPU usage s mean. Mean of CPU usage(%) Experiment No. Figure 7. Comparison of CPU usage s means Experiment 5: Determine the threshold of available memory s mean We do 10 repeated experiments to determine the threshold of available memory s mean. Fig. 8 shows a comparison of the available memory s mean in each experiment, and we select the maximum available memory s mean (71.59MB) as the system threshold of available memory s mean. Mean of available memory(mb) Experiment No. Figure 8. Comparison of available memory s means B. User migration experiment In this paper, the physical environment of the user migration experiment consists of three servers, and two VGNs are deployed on each of them, thus a video conferencing system that includes six multimedia gateways is constituted, on which we do a number of user migration experiments. In the experiments, we record the timestamp of the last packet received by client before user migration and the timestamp of the first packet received by client after user migration, and use the difference of them as the time delay of the user migration.the outcome of the experiment is shown in Fig. 9. User migration delay(ms) Experiment No. Figure 9. Time delay of user migration regular migration delay improved migration delay normal delay The normal delay in Fig. 9 refers to the time interval between two packets received by client without user migration. Results can be seen from Fig. 9 that the regular user migration process could control the time delay under 113 milliseconds, which gives users a good experience of audio and video continuity, and the improved user migration process could control the time delay under 65 milliseconds, which gives users a better experience of audio and video continuity. In summary, the user migration strategy implemented in this article can play an outstanding performance in both active pattern and passive pattern, which not only migrate users to the appropriate target multimedia gateway but also ensure the continuity of audio and video during user migration.

8 VI. CONCLUSION In this paper, we take full advantage of the outstanding performance of cloud computing, and present a new highly scalable, reliable, and user friendly cloud-based video conference multiple-gateway architecture for the efficient management of large-scale multimedia conferencing service, which can control a variety of virtual gateway resources based on physical devices and dynamically deploy multimedia gateways, thus meeting the needs of system expansion and saving energy by merging some low-load virtual gateway nodes. We also implement a user migration strategy, which combines active pattern with passive pattern, based on the cloud-based video conference multi-gateway system mentioned previously. The strategy can successfully solve the reliability problems caused by overload or downtime, thus improving the quality of service. We have already applied this video conference system with the user migration strategy in many provinces and cities of China, such as Beijing, Yan an, Jinggangshan, Kangbao, etc, and achieved good results. In addition, there are also some disadvantages in this paper. For example, the framework designed in this paper has only one MGCC, whose fault-tolerant mechanism is relatively simple and robustness is relatively weak. In the future, we are planning to do some in-depth studies on these issues. VII. ACKNOWLEDGEMENTS This work was supported by the State Key Laboratory of Software Development Environment Funding No.SKLSDE- 2012ZX-19. REFERENCES [1] Rajkumar Buyya, Chee Shin Yeo, Market-oriented cloud computing:vision, hype, and reality for delivering it services as computing utilities, Proceedings of 10th IEEE Int. Conf. High Performance Computing and Communications. 2008:5 13. [2] A. Weiss, Computing in the Clouds, NetWorker, 2007, 11(4): [3] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, Cloud Computing and emerging IT platforms: Vision, hype, and reality for delivering IT services as the 5th utility, Future Generation of Computer Systems, 25 (2009), [4] Ling Qian, Zhiguo Luo, Yujian Du, and Leitao Guo, Cloud Computing: An Overview, Cloud Computing, Vol , [5] Yang zhenzou, Changjia Chen, MCU System Software in Video Conference Network, IEEE Communication Transations, 1996: [6] M. Barnes, C. Boulton, and O. Levin, A Framework for Centralized Conferencing, RFC 5239, IETF, June [7] Y.Cho, M. Jeong, J. Nah, W.Lee and J.Park, Policy-Based Distributed Management Architecture for Large-Scale Enterprise Conferencing Service Using SIP, IEEE Journal on Selected Areas in Communications. 2005: [8] Y. Cho, M. Jeong, J. Park, and W. Lee, Distributed Management Architecture for Multimedia Conferencing Using SIP, Proceedings of the First International Conference on Distributed Frameworks for Multimedia Applications. 2005: [9] A. Buono, S. Loreto, L. Miniero, and S. P. Romano, A Distributed IMS Enabled Conferencing Architecture on Top of a Standard Centralized Conferencing Framework, IEEE Communications Magazine. 2007: [10] Z. Yang, H. Ma and J. Zhang, A Dynamic Scalable Service Model for SIP-based Video Conference, Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design. 2005: [11] JinTian, Xiangzhi Sheng, LuJian, Admire - A Prototype of Large Scale E-collaboration Platform, Grid and Cooperative Computing, Second International Workshop. 2003:

Study on Service-Oriented Cloud Conferencing

Study on Service-Oriented Cloud Conferencing Study on Service-Oriented Cloud Conferencing Junchao Li School of Computer Science and Technology University of Science and Technology of China Hefei, China lijch@mail.ustc.edu.cn Ruifeng Guo Shenyang

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Chapter 19 Cloud Computing for Multimedia Services

Chapter 19 Cloud Computing for Multimedia Services Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5

More information

Auto-Scaling Model for Cloud Computing System

Auto-Scaling Model for Cloud Computing System Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 16 (2014), pp. 1605-1610 International Research Publications House http://www. irphouse.com A Load Balancing

More information

New Cloud Computing Network Architecture Directed At Multimedia

New Cloud Computing Network Architecture Directed At Multimedia 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network

More information

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction

Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

A Real-Time Cloud Based Model for Mass Email Delivery

A Real-Time Cloud Based Model for Mass Email Delivery A Real-Time Cloud Based Model for Mass Email Delivery Nyirabahizi Assouma, Mauricio Gomez, Seung-Bae Yang, and Eui-Nam Huh Department of Computer Engineering Kyung Hee University Suwon, South Korea {assouma,mgomez,johnhuh}@khu.ac.kr,

More information

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing

Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Dynamic Scalable Model for Video Conferencing (DSMVC) using Request Routing Adeel Anwar Abbasi*, Tahir Mehmood** {*Department of Computer Sciences, Shaheed Zulfiqar Ali Bhutto Institute of Science and

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues

More information

A Middleware Strategy to Survive Compute Peak Loads in Cloud

A Middleware Strategy to Survive Compute Peak Loads in Cloud A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

CHAPTER 2 THEORETICAL FOUNDATION

CHAPTER 2 THEORETICAL FOUNDATION CHAPTER 2 THEORETICAL FOUNDATION 2.1 Theoretical Foundation Cloud computing has become the recent trends in nowadays computing technology world. In order to understand the concept of cloud, people should

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI, Matunga, Mumbai, India, E-mail:harshagzb89@gmail.com. Abstract

More information

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing

Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud

Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud Allocation of Datacenter Resources Based on Demands Using Virtualization Technology in Cloud G.Rajesh L.Bobbian Naik K.Mounika Dr. K.Venkatesh Sharma Associate Professor, Abstract: Introduction: Cloud

More information

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing

International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

An Efficient Use of Virtualization in Grid/Cloud Environments. Supervised by: Elisa Heymann Miquel A. Senar

An Efficient Use of Virtualization in Grid/Cloud Environments. Supervised by: Elisa Heymann Miquel A. Senar An Efficient Use of Virtualization in Grid/Cloud Environments. Arindam Choudhury Supervised by: Elisa Heymann Miquel A. Senar Index Introduction Motivation Objective State of Art Proposed Solution Experimentations

More information

Performance Evaluation of Round Robin Algorithm in Cloud Environment

Performance Evaluation of Round Robin Algorithm in Cloud Environment Performance Evaluation of Round Robin Algorithm in Cloud Environment Asha M L 1 Neethu Myshri R 2 Sowmyashree C.S 3 1,3 AP, Dept. of CSE, SVCE, Bangalore. 2 M.E(dept. of CSE) Student, UVCE, Bangalore.

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Network Virtualization for Large-Scale Data Centers

Network Virtualization for Large-Scale Data Centers Network Virtualization for Large-Scale Data Centers Tatsuhiro Ando Osamu Shimokuni Katsuhito Asano The growing use of cloud technology by large enterprises to support their business continuity planning

More information

Silver Peak Virtual Appliances

Silver Peak Virtual Appliances Silver Peak Virtual Appliances Frequently Asked Questions (FAQ) VX Installation This section addresses questions or problems you may encounter during Silver Peak VX installation. 1. I need to increase

More information

LSKA 2010 Survey Report I Device Drivers & Cloud Computing

LSKA 2010 Survey Report I Device Drivers & Cloud Computing LSKA 2010 Survey Report I Device Drivers & Cloud Computing Yu Huang and Hao-Chung Yang {r98922015, r98944016}@csie.ntu.edu.tw Department of Computer Science and Information Engineering March 31, 2010 Abstract

More information

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform

An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman 1, Kawser Wazed Nafi 2, Prof. Syed Akhter Hossain 1 and Prof. M. M. A. Hashem 1 Department

More information

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS

CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS CLOUD COMPUTING AND SECURITY: VULNERABILITY ANALYSIS AND PREVENTIVE SOLUTIONS Musa Ahmed Zayyad Department of Computer Studies, Hassan Usman Katsina Polytechnic, Katsina E-mail: zayyad19@yahoo.com +2348063440008(Nigeria)

More information

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD

AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014

More information

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT International Journal of Advanced Technology in Engineering and Science www.ijates.com DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT Sarwan Singh 1, Manish Arora

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

An Approach to Load Balancing In Cloud Computing

An Approach to Load Balancing In Cloud Computing An Approach to Load Balancing In Cloud Computing Radha Ramani Malladi Visiting Faculty, Martins Academy, Bangalore, India ABSTRACT: Cloud computing is a structured model that defines computing services,

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment

A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment A Framework for Security Context Migration in a Firewall Secured Virtual Machine Environment Zahra Tavakoli, Sebastian Meier, and Alexander Vensmer Institute of Communication Networks and Computer Engineering

More information

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information

More information

Founded in 2010 70+ employees Guinness World Record for the largest online training Provides videoconferencing with 4K Ultra HD SaaS and On-Premise

Founded in 2010 70+ employees Guinness World Record for the largest online training Provides videoconferencing with 4K Ultra HD SaaS and On-Premise Founded in 2010 70+ employees Guinness World Record for the largest online training Provides videoconferencing with 4K Ultra HD SaaS and On-Premise solutions: Mind Cloud and Mind Server Mobile client for

More information

A Survey on Load Balancing and Scheduling in Cloud Computing

A Survey on Load Balancing and Scheduling in Cloud Computing IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel

More information

The Application and Development of Software Testing in Cloud Computing Environment

The Application and Development of Software Testing in Cloud Computing Environment 2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Design and Implementation of IaaS platform based on tool migration Wei Ding

Design and Implementation of IaaS platform based on tool migration Wei Ding 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory

More information

A Survey on Cloud Computing Security, Challenges and Threats

A Survey on Cloud Computing Security, Challenges and Threats A Survey on Cloud Computing Security, Challenges and Threats Rajnish Choubey 1, Rajshree Dubey 2, Joy Bhattacharjee 3 1 Assistant Professor, Dept. of CSE, TCT, Bhopal, India 2. Assistant Professor, Dept.

More information

QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture

QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture QoS Based Scheduling of Workflows in Cloud Computing UPnP Architecture 1 K. Ramkumar Research Scholar Computer Science and Engineering Manonmaniam Sundaranar University Tirunelveli - 627012, Tamilnadu,

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

Network performance in virtual infrastructures

Network performance in virtual infrastructures Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso

More information

Private Cloud in Educational Institutions: An Implementation using UEC

Private Cloud in Educational Institutions: An Implementation using UEC Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,

More information

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b

Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan

More information

Extending Networking to Fit the Cloud

Extending Networking to Fit the Cloud VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at

More information

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE Johan Versendaal HU University of Applied Sciences Utrecht Nijenoord 1, 3552 AS Utrecht, Netherlands, johan.versendaal@hu.nl Utrecht University

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

E-Business Technology

E-Business Technology E-Business Technology Presented to: Prof. Dr. Eduard Heindl By: Bhupesh Sardana BCM WS 2010-11 Date: 21-Jan-2011 Business Case Your business is growing exponentially. Your computing need & usage is getting

More information

Minimize Response Time Using Distance Based Load Balancer Selection Scheme

Minimize Response Time Using Distance Based Load Balancer Selection Scheme Minimize Response Time Using Distance Based Load Balancer Selection Scheme K. Durga Priyanka M.Tech CSE Dept., Institute of Aeronautical Engineering, HYD-500043, Andhra Pradesh, India. Dr.N. Chandra Sekhar

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Cloud Computing : Concepts, Types and Research Methodology

Cloud Computing : Concepts, Types and Research Methodology Cloud Computing : Concepts, Types and Research Methodology S. Muthulakshmi Bangalore,Karnataka India- 560068 Abstract: Cloud -computing is a very popular term in this modern and computer world in IT solution

More information

RESOURCE MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT

RESOURCE MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT RESOURCE MANAGEMENT IN CLOUD COMPUTING ENVIRONMENT A.Chermaraj 1, Dr.P.Marikkannu 2 1 PG Scholar, 2 Assistant Professor, Department of IT, Anna University Regional Centre Coimbatore, Tamilnadu (India)

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

Enhancing the Scalability of Virtual Machines in Cloud

Enhancing the Scalability of Virtual Machines in Cloud Enhancing the Scalability of Virtual Machines in Cloud Chippy.A #1, Ashok Kumar.P #2, Deepak.S #3, Ananthi.S #4 # Department of Computer Science and Engineering, SNS College of Technology Coimbatore, Tamil

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Cloud Computing & Spatial Database - A Research Paper

Cloud Computing & Spatial Database - A Research Paper Role of Spatial Database in Virtual Networking - Cloud Computing DR. NEERAJ BHARGAVA Associate Professor, Department of Computer Science School of Engineering & System Sciences, MDS University, Ajmer drneerajbhargava@yahoo.co.in

More information

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department

More information

Providing Flexible Security as a Service Model for Cloud Infrastructure

Providing Flexible Security as a Service Model for Cloud Infrastructure Providing Flexible Security as a Service Model for Cloud Infrastructure Dr. M. Newlin Rajkumar, P. Banu Priya, Dr. V. Venkatesakumar Abstract Security-as-a-Service model for cloud systems enable application

More information

A Prediction-Based Transcoding System for Video Conference in Cloud Computing

A Prediction-Based Transcoding System for Video Conference in Cloud Computing A Prediction-Based Transcoding System for Video Conference in Cloud Computing Yongquan Chen 1 Abstract. We design a transcoding system that can provide dynamic transcoding services for various types of

More information

Research and implementation on cloud computing security based on HDFS

Research and implementation on cloud computing security based on HDFS Abstract Research and implementation on cloud computing security based on HDFS Zhilong Liu School of Mathematics and Computer Science, XinYu University, JiangXi, 338004, China Corresponding author s e-mail:

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

A Survey on Cloud Computing

A Survey on Cloud Computing A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India dalapati89@gmail.com G. Sahoo Department of Information Technology Birla

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan

How To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches

More information

A New Scalable Server Construction Method Based On. Virtual Machine Transfer and Duplication

A New Scalable Server Construction Method Based On. Virtual Machine Transfer and Duplication A New Scalable Server Construction Method Based On Virtual Machine Transfer and Duplication Yuko KAMIYA and Toshihiko SHIMOKAWA Graduate School of Information Science, Kyushu Sangyo University, JAPAN Faculty

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER

CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER STRATEGIC WHITE PAPER As cloud services become increasingly popular, more questions arise about the capabilities of cloud solutions.

More information

Cisco Dynamic Workload Scaling Solution

Cisco Dynamic Workload Scaling Solution Cisco Dynamic Workload Scaling Solution What You Will Learn Cisco Application Control Engine (ACE), along with Cisco Nexus 7000 Series Switches and VMware vcenter, provides a complete solution for dynamic

More information

A Study on Architecture of Private Cloud Based on Virtual Technology

A Study on Architecture of Private Cloud Based on Virtual Technology A Study on Architecture of Private Cloud Based on Virtual Technology Zhao Huaming National Science Library, Chinese Academy of Sciences Beijing, China Abstract with the cloud service platform of National

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications

CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications Bhathiya Wickremasinghe 1, Rodrigo N. Calheiros 2, and Rajkumar Buyya 1 1 The Cloud Computing

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Enlarge Bandwidth of Multimedia Server with Network Attached Storage System Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang Key Laboratory of Data Storage System, Ministry of Education College of Computer, Huazhong

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091 Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information