COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES

Size: px
Start display at page:

Download "COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES"

Transcription

1 COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science Department NFC-IEFR Faisalabad, Punjab, Pakistan **Corresponding Author: Abstract: Cloud computing is a structure of services which provides its users the access to cloud servers through internet to hire as many services as he/she could. The main focus of this research is on the Internet Protocol versions IPv4 and IPv6. The cloud in computer networks is actually a setup of servers providing different services to the users via internet. In this regard Internet Protocol is back-bone of internet and cloud computing. Internet Protocol is necessary element to route data from a user to the servers of cloud through the internet. In this paper we compare these two internet protocols over the cloud. We will design a scenario on OPNET 14.5 to analyze the results. Keywords: Cloud Computing, IPv4, IPv6, cloud, OPNET Introduction A. CLOUD COMPUTING It's modern technology that provides user access to its servers through the Internet for its services. Cloud just gave us a chance to store our data online. From the definition offered by Cisco we assume the three types of cloud environment, 1) On-Demand: services are the services provided to users when they demand to hire them. 2) On-Scale: services are provided to users according to the payment done by or by the status of the user. For example if user is an organization then the scale of services will be different. 3) Multi-tenant: services are those services which can be allocated to more than one user at a time. B. CLOUD COMPUTING DEPLOYMENT MODELS Cloud computing can be categorized according to its deployment structures. Four main deployment structures or models are described as follows, 1) Public Cloud: is a kind of cloud in which applications are made generally accessible to the public. Clients are hence publically allowed to access and use the services all over the internet We have lots of examples in our real life scenario include Social Networking sites like Face-book, yahoo, Twitter etc. Public Cloud environment is most preferably applicable in those organizational scenarios where number of industries has same kind of needs. 2) Private Cloud: as the name indicates is generally designed for an individual or for personal use. Traditionally it is implemented by a single organization within its own circle. For example the cloud servers within an industry to provide cloud services to its own employees. 3) Community Cloud: Community cloud as its name shows is a set of services between two or more organizations to communicate and share data and programs between them. Let's take an example to explain this community cloud architecture. For example five universities connected with each other to share the computing resources are forming a community cloud. 4) Hybrid Cloud: By getting the mixture of services of public and private cloud the hybrid cloud is formed. In simple words when an organization shares some services on public channel and some on its own private channel then this architecture is called the hybrid cloud. C. SERVICE CLASSIFICATION Cloud computing division w.r.t services is given below, 1) Software as a Service (SaaS): The true meaning of the software as a service is to provide programs on the WWW as a Web service. So that the user can take advantage of the software in the internet browser without downloading and installing NFC-IEFR Journal of Engineering & Scientific Research 5

2 it. The most common examples of SaaS (software as a service) providers are Microsoft and Google 2) Platform as a Service (PaaS): Architecture brings the concept of customizable user platform to build their own applications required. Users do not need to panic about the hardware investment and maintenance expenses. The most common are the providers of PaaS and Windows Azure, Heroku, Force.com. 3) Infrastructure as a Service (IaaS): Infrastructure as a model service users to get more concessions from SaaS and PaaS architectures. The user can define and manage the hardware specifications of the apparatus default provided by the service provider cloud. Often used IAAS are going network and Amazon EC2 Protocol (communication protocol) is a pattern of rules that are applied. So that the device (such as a computer) can perform different functions, especially any communication with each other. Internet Protocol (IP) is the ruler of the Internet. When the hosts (computers) to establish a connection to the Internet, IP address is assigned to them individually. These data packets hosts exchange with each other to communicate with each other. These data packets contain the IP addresses of the source and destination hosts. When the host connects with the other host, it transmits a package with the IP addresses of the source and destination. Internet Protocol version 4 is the title of the 32-bit. It contains 4 octets or unique parts of four sentences, and the total number of IPv4 addresses are (232) = In 1990, the Internet Engineering Task Force saw that the new version of the IP would be needed. Has been the development of Internet Protocol Next Generation (IPng), which was later called Internet Protocol Version 6 IPv6 is a standard protocol layer 2 (WRT TCP / IP Model), which follows IPv4 addresses to communicate over the Internet and other networks. The size of the IPv6 address is 128 bits. we can write address in hexadecimal or binary codes. Therefore, the total number of IP addresses I P v 6 c a n p r o v i d e i s = e It's a large amount of addresses. I. LITERATURE REVIEW H. Zahid, A. Arshad, M. Khalid, B. Saeed and A. Rafique (2013) Descript that the technology, which provides us with a practical computing resources across the Internet all over the world and the socalled cloud computing. This paper covers security issues of DOS attacks on servers cloud by pirates or zombies. J. P. Sahlin, S. Sarkani and T. Mazzuchi (2012) said that there are two types of providers of cloud services, and one is the one that offers cloud services for the purpose of their business and other government institutions that do not want to make a profit from cloud services, but they want to keep the cost as low as possible. Even for both type of cloud service providers and effective way to learn how you can upgrade the system to take advantage and keep the cost without affecting the quality of service (QoS), is a tool OPNET. Gandotra, P. Abrol, P. Gupta, R. Uppal and S. Singh (2011) said that each author's definition of cloud computing is in their own words. Sometimes we feel the confusion which definition is correct. First of all, cloud computing is not a completely new concept it is triggered in 1998 when we started the grid computing and it is also associated with cluster computing. In this paper will be to discuss details about grid computing and cluster computing technology and the future of cloud computing. M. Cotton, L. Vegoda, R. Bonica & B. Haberman (2013) explained that the purpose of their paper is reset block of IPv /24 to IANA. This document is the imposition of IANA to rebuild their records for the purposes of private address of the IPv4 and IPv6. They said that this paper is a product of the Internet Engineering Task Force (IETF). It reflects the IETF community and allows publication by the Internet Engineering Group (IESG) leadership. Result in the publication of this document in the RFC (Request for Comments) No. 4773, and 5736 is no more in function. J. Touch (2013) Wrote that the work ID in IPv4 is to assist the process of breaking up and removing fragmentation during the transmission process. Other quality of this is that it must be different for each packet of data packets, and should retain its NFC-IEFR Journal of Engineering & Scientific Research 6

3 value for the maximum time. If he does so then transfer speed or links will be limited to 6.4 megabits per second. But the normal regulations reflect this limit. Therefore, the purpose of this document is to update No. RFC 791, 2003 and this update is to discuss with the viewpoint of the current use of near field ID addresses IPv4. G. Bhatia, A. Lala and A. Chaurasia (2012) extracted from that cloud computing is somewhat a combination of virtualization and distributed computing and utility computing. Add new networks and the Internet makes it more useful to end users. These days the user has no need to buy expensive computing devices. What he has to do is just to hire a cloud service. Indian Railways (the fourth-largest train system in the world), which carries 30 million humans and 2.8 million ton of luggage a day working at a loss. The reason for this loss is the black market for tickets by employees, passengers and overloading trains without tickets. This paper discusses how to implement cloud computing to solve all these problems, as well as Internet facility in trains. Designed scenario discussed in OPNET simulation. The structure is configured the same scenario all versions of IP (IPv4 and IPv6) to make a comparison between both versions of IP. Research scenario is shown in Figure 1 contains servers that provide cloud database, FTP, and video conferencing services to LAN networks connected to these servers through a network of routers. Each LAN contains 100 customers. All users in these local networks used all types of services. Figure 2 represents a summary of inventory scenario discussed in the design modeler OPNET The parameters we set to measure the performance of IPv4 and IPv6 on the same scenario question the response time of the database service, download the response time of the service FTP, download the response time for the FTP service and end-to-end packet delay for video conferencing service. 2. Research Work OPNET is best tool to do the modeling of networks. With the help of OPNET Modeler, we can judge and check all likelihood after a change in the structure of the network. Fig. 2: Network Inventory Summary 3. Results Analysis Fig. 1: Research Scenario Figure 3 is a graph that represents the query database shows the results of the response time of both scenarios IPv4 and IPv6. It shows that IPv4 is fast in NFC-IEFR Journal of Engineering & Scientific Research 7

4 service to query the database cloud version of IPv6. Figures 4 and 5 show the results of FTP download and upload response times, respectively. IPv6 has demonstrated a delay in responses to a smaller number of cases of IPv4 addresses and IPv4, but the delay was much less of IPv6 on those cases. Graph in Figure 6 describes the end-to-end delay through video conferencing. IPv6 has again put more time delay of IPv4, but in a smaller number of cases. Figure 5: FTP Upload Response Time Figure 3: DB Query Response Time Figure 6: Video Conference End to End Delay 4. Conclusion Figure 4: FTP Download Response Time Considering the simulation, we got graphical results, it is concluded that even if IPv6 is a newer version of IPv4 has advanced features than IPv4, but the larger size of the header caused the delay in the transmission and bulk traffic, such as video conferences delay is much larger than the delay IPv4. So if IPv4 replaced by IPv6 (for cloud services), the first threat that we face is greater delay NFC-IEFR Journal of Engineering & Scientific Research 8

5 in traffic cloud References [1]. G. Bhatia, A. Lala & A. Chaurasia India Implementation of Cloud Computing Technology in Indian Railway Institute of Technology & Sciences, Jabalpur, India. IP CS IT vol. 37, [2]. H. Zahid, A. Arshad, M. Khalid, B. Saeed & A. Rafique Implementation of Cloud Computing over the MAN and Analysis of DOS Attacks Department of Computer Sciences, NFC Institute of Engineering and Fertilizer Research, Faisalabad, Pakistan. International Journal of Science and Advanced Technology (ISSN ). Volume 3 No 10 October [3]. [4]. [5]. [6]. Numbers_Authority [7] I. Gandotra, P. Abrol, P. Gupta, R. Uppal and S. Singh Cloud Computing Over Cluster, Grid Computing [8] J. Touch Updated Specification of the IPv4 ID Field Internet Engineering Task Force (IETF), Category: Standards Track, ISSN: , February [9] J. P. Sahlin, S. Sarkani & T. Mazauchi Optimizing QoS in Distributed Systems / Cloud Computing Architectures' 'Department of Engineering Management and Systems Engineering Washington, D.C Volume 42 No. 18, March [10] M. Cotton, L. Vegoda, R. Bonica & B. Haberman Special-Purpose IP Address Registries Internet Engineering Task Force (IETF), Category: Best Current Practice, ISSN: , April 2013 NFC-IEFR Journal of Engineering & Scientific Research 9

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

Load Balancing Algorithms in Cloud Computing: A Comparative Study

Load Balancing Algorithms in Cloud Computing: A Comparative Study Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool

More information

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most

More information

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25

I. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25 RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,

More information

CS 520: Network Architecture I Winter Lecture 11: NAT and IPv6

CS 520: Network Architecture I Winter Lecture 11: NAT and IPv6 CS 520: Network Architecture I Winter 2007 Lecture 11: NAT and IPv6 The previous lecture discussed how subnetting and supernetting (CIDR) can be used to make better use of global IP addresses. This lecture

More information

Kusum Lata, Sugandha Sharma

Kusum Lata, Sugandha Sharma International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance Comparison of Internet Protocol v4 with Internet Protocol v6

Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

IPv4 to IPv6 Network Migration and Coexistence

IPv4 to IPv6 Network Migration and Coexistence IPv4 to IPv6 Network Migration and Coexistence A.Chandra 1, K. Lalitha 2 1 Assistant Professor, Department of CSSE, Sree Vidyanikethan Engg. College, Tirupati, Andhra Pradesh, India 2 Assistant Professor(SL),

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Cloud Computing and Its Security Issues - A Review

Cloud Computing and Its Security Issues - A Review Cloud Computing and Its Security Issues - A Review Jitender Grover 1,Shikha 2, Mohit Sharma 3 1, 2, 3 Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India 1 jitendergrover0101@gmail.com,

More information

NETWORK LAYER: IP Addressing

NETWORK LAYER: IP Addressing NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill

More information

Faculté Polytechnique

Faculté Polytechnique Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and

More information

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

CS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,

CS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12, CS 6393 Lecture 10 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 The Cloud The Network is the Computer - Sun

More information

Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative

Cloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative SEI Webinar November 12, 2009 Polling Question 1 How did you hear about this webinar?

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

CLOUD COMPUTING ABSTRACT

CLOUD COMPUTING ABSTRACT Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one

More information

Internet Engineering Task Force (IETF) Request for Comments: 6441 BCP: 171 November 2011 Category: Best Current Practice ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6441 BCP: 171 November 2011 Category: Best Current Practice ISSN: Internet Engineering Task Force (IETF) L. Vegoda Request for Comments: 6441 ICANN BCP: 171 November 2011 Category: Best Current Practice ISSN: 2070-1721 Abstract Time to Remove Filters for Previously Unallocated

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)

A Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS) A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan

More information

Online Editor for Compiling and Executing Different Languages Source Code

Online Editor for Compiling and Executing Different Languages Source Code Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Request for Comments: 5569 Category: Informational January 2010 ISSN:

Request for Comments: 5569 Category: Informational January 2010 ISSN: Independent Submission R. Despres Request for Comments: 5569 RD-IPtech Category: Informational January 2010 ISSN: 2070-1721 Abstract IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) IPv6 rapid deployment

More information

IDS in Cloud Environment as Service Based Manner

IDS in Cloud Environment as Service Based Manner International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 273-278 International Research Publications House http://www. irphouse.com /ijict.htm IDS

More information

Access Control Lists and IP Fragments

Access Control Lists and IP Fragments Access Control Lists and IP Fragments Document ID: 8014 Contents Introduction Types of ACL Entries ACL Rules Flowchart How Packets Can Match an ACL Example 1 Example 2 fragments Keyword Scenarios Scenario

More information

IP Multicast Addressing

IP Multicast Addressing APPENDIX B Multicast delivery is enabled by setting up a multicast address on the Content Engine in the form of a multicast cloud configuration to which different devices, configured to receive content

More information

Internet Engineering Task Force (IETF) Category: Standards Track. S. Krishnan Ericsson October 2015

Internet Engineering Task Force (IETF) Category: Standards Track. S. Krishnan Ericsson October 2015 Internet Engineering Task Force (IETF) Request for Comments: 7676 Category: Standards Track ISSN: 2070-1721 C. Pignataro Cisco Systems R. Bonica Juniper Networks S. Krishnan Ericsson October 2015 IPv6

More information

Fixed Innovative Bandwidth Utilization in TDM EPON

Fixed Innovative Bandwidth Utilization in TDM EPON 634 Fixed Innovative Bandwidth Utilization in TDM EPON Muhammad Bilal 1, Muhammad Awais 2, Muhammad Irfan 3, Ammar Rafiq 4 1 Department of Computer Science, NFC Institute of Engineering & Fertilizer Research,

More information

Assistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id

Assistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India  Id International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 7 ISSN : 2456-3307 An Architectural Framework of Cloud Computing behind

More information

Migration to IPv6 from IPv4. Is it necessary?

Migration to IPv6 from IPv4. Is it necessary? Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it

More information

A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo

A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo Abstract: Load Balancing is a computer networking method to distribute workload across

More information

Lecture 02. Ecommerce, EC Classification, Web, HTTP connections & Networks

Lecture 02. Ecommerce, EC Classification, Web, HTTP connections & Networks Lecture 02 Ecommerce, EC Classification, Web, HTTP connections & Networks Mr. Mubashir Ali Lecturer (Dept. of dr.mubashirali1@gmail.com 1 Outline 1. What is Ecommerce 2. EC Classification 3. The Web 4.

More information

Simulation of Cloud Computing Environments with CloudSim

Simulation of Cloud Computing Environments with CloudSim Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.

More information

IPv6. Dispelling the Magic

IPv6. Dispelling the Magic IPv6 Dispelling the Magic Board Chairman RIPE NCC 1 Why the Title? 96 more bits. No Magic Gaurab Raj Upadhaya 2 Agenda RIPE NCC Background to IPv6 History of IPv6 Why Deploy Ipv6? Where are we Conclusions

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud

More information

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.

This tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples. About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described

More information

CLOUD COMPUTING: SEARCH ENGINE IN AGRICULTURE

CLOUD COMPUTING: SEARCH ENGINE IN AGRICULTURE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

Title DC Automation: It s a MARVEL!

Title DC Automation: It s a MARVEL! Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

A Survey On Load Balancing Methods and Algorithms in Cloud Computing

A Survey On Load Balancing Methods and Algorithms in Cloud Computing International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-5, Issue-4 E-ISSN: 2347-2693 A Survey On Load Balancing Methods and Algorithms in Cloud Computing M. Lagwal 1*,

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

PROFITBRICKS IAAS VIRTUAL DATA CENTER. An Introduction to ProfitBricks VDC

PROFITBRICKS IAAS VIRTUAL DATA CENTER. An Introduction to ProfitBricks VDC PROFITBRICKS IAAS VIRTUAL DATA CENTER An Introduction to ProfitBricks VDC Why Cloud Computing? In the future, it will be difficult for IT service providers to avoid the subject of cloud computing. Still

More information

IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network

IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network White Paper IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network What You Will Learn IPv6 Rapid Deployment (6rd) (RFC 5969) 6rd is a stateless tunneling mechanism which allows

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application

Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh, Shaheed Bhagat Singh State Technical Campus, Ferozepur,

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

11:1 Anonymous Internet Access Method for Wireless Systems

11:1 Anonymous Internet Access Method for Wireless Systems 11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction

More information

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017 Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks

More information

1 The intersection of IAM and the cloud

1 The intersection of IAM and the cloud 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324

IP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324 IP Addressing Week 6 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Addressing: Network & Host Network address help to identify route through the network cloud Network address

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Comparative Analysis of Two Prominent Routing Protocols in IPv6 Network: OSPFv3 & EIGRPv6

Comparative Analysis of Two Prominent Routing Protocols in IPv6 Network: OSPFv3 & EIGRPv6 International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Comparative Analysis of Two Prominent Routing Protocols

More information

Link download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data

More information

MIT International Journal of Electrical and Instrumentation Engineering Vol. 3, No. 1, Jan. 2013, pp

MIT International Journal of Electrical and Instrumentation Engineering Vol. 3, No. 1, Jan. 2013, pp MIT International Journal of Electrical and Instrumentation Engineering Vol. 3, No. 1, Jan. 2013, pp. 15 20 15 MPLS and NGN Networks: The Future Aspects for Railways Communication System Alok Pandey E,

More information

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C.

CCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B. 191.2.1.2:2:11.1 C. 2001::98 D. 2002:c0a8:101::42 E. :2001:: F. 2002.cb0a:3cdd:1::1 Answer: C, D. 2013 1 Which method

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0

Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Karanveer Singh 1, Naveen Goyal 2 1 Research Scholar,ECE Deptt.,Bhai Gurdas Institute of Engineering and Technology, Sangrur 2 Assistant

More information

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration

More information

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop

Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing

More information

Chapter 8: Subnetting IP networks. Introduction to Networks v5.1

Chapter 8: Subnetting IP networks. Introduction to Networks v5.1 Chapter 8: Subnetting IP networks Introduction to Networks v5.1 8.0 Introduction 8.1 Subnetting an IPv4 Network 8.2 Addressing Schemes 8.3 Design Considerations for IPv6 8.4 Summary 2013 Cisco and/or its

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Load Balancing in Cloud Computing System

Load Balancing in Cloud Computing System Rashmi Sharma and Abhishek Kumar Department of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India E-mail: abhishek221196@gmail.com (Received on 10 August 2012 and accepted on 15 October 2012)

More information

CLOUD COMPUTING & ITS LOAD BALANCING SCENARIO

CLOUD COMPUTING & ITS LOAD BALANCING SCENARIO CLOUD COMPUTING & ITS LOAD BALANCING SCENARIO Dr. Naveen Kr. Sharma 1, Mr. Sanjay Purohit 2 and Ms. Shivani Singh 3 1,2 MCA, IIMT College of Engineering, Gr. Noida 3 MCA, GIIT, Gr. Noida Abstract- The

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE

MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering

More information

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at

Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

Cloud Computing Briefing Presentation. DANU

Cloud Computing Briefing Presentation. DANU Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

Mapping of Address and Port Using Translation

Mapping of Address and Port Using Translation The feature provides connectivity to IPv4 hosts across IPv6 domains. Mapping of address and port using translation (MAP-T) is a mechanism that performs double translation (IPv4 to IPv6 and vice versa)

More information

Efficient Data Distribution in CDBMS based on Location and User Information for Real Time Applications

Efficient Data Distribution in CDBMS based on Location and User Information for Real Time Applications ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Efficient Data Distribution in CDBMS based on Location and User Information for Real

More information

DESIGN AND IMPLEMENTATION OF IPV4 ROUTING INFORMATION PROTOCOL

DESIGN AND IMPLEMENTATION OF IPV4 ROUTING INFORMATION PROTOCOL IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) Vol. 1, Issue 3, Aug 2013, 51-56 Impact Journals DESIGN AND IMPLEMENTATION OF IPV4 ROUTING INFORMATION PROTOCOL SARBJEET

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

LOGICAL ADDRESSING. Faisal Karim Shaikh.

LOGICAL ADDRESSING. Faisal Karim Shaikh. LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address

More information

D. Suresh Kumar, E. George Dharma Prakash Raj

D. Suresh Kumar, E. George Dharma Prakash Raj International Journal of Scientific Research in Computer Science, Engineering and Information Technology 18 IJSRCSEIT Volume 3 Issue 1 ISSN : 2456-37 A Comparitive Analysis on Load Balancing Algorithms

More information

Queuing Mechanisms to improve QoS for VOIP over IPv4 and MPLS networks

Queuing Mechanisms to improve QoS for VOIP over IPv4 and MPLS networks Queuing Mechanisms to improve QoS for VOIP over IPv4 and MPLS networks Sumera Saleem Mansoor Ahmed Tahir Abstract In this paper, an implementation of different Queuing mechanisms over MPLS network for

More information

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive

More information

Distributed System Framework for Mobile Cloud Computing

Distributed System Framework for Mobile Cloud Computing Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey

More information

Internet Engineering Task Force (IETF) Request for Comments: March 2012

Internet Engineering Task Force (IETF) Request for Comments: March 2012 Internet Engineering Task Force (IETF) Request for Comments: 6549 Updates: 2328 Category: Standards Track ISSN: 2070-1721 A. Lindem Ericsson A. Roy S. Mirtorabi Cisco Systems March 2012 OSPFv2 Multi-Instance

More information

Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015

Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015 Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track ISSN: 2070-1721 L. Bertz S. Manning Sprint B. Hirschman October 2015 Diameter Congestion and Filter Attributes

More information

Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security

Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security ABSTRACT Muhammad Wasim Abbas Ashraf * & Ahsan Raza Sattar ** *Computer Science, University of Agriculture, Faisalabad, Punjab,

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

SOSPG1: IPv6, Tomorrow s Network Here Today. Session Overview. In the beginning 8/8/2011

SOSPG1: IPv6, Tomorrow s Network Here Today. Session Overview. In the beginning 8/8/2011 SOSPG1: IPv6, Tomorrow s Network Here Today. Mark Brophy, I.T. Director, Rogers Townsend & Thomas Jim Small & Craig Weinhold CDW Advanced Technology Services Session Overview Brief review of the characteristics

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications

Mapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications Mapping of Address and Port () an ISPs Perspective E. Jordan Gottlieb Principal Engineer Charter Communications jordan.gottlieb@charter.com Agenda What is? Benefits of in Action Algorithms in Action Deployment

More information

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Re-allocation of Tasks according to Weights in Cloud Architecture

Re-allocation of Tasks according to Weights in Cloud Architecture Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.727

More information

CHAPTER-2 IP CONCEPTS

CHAPTER-2 IP CONCEPTS CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP

More information