COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES
|
|
- Joella Little
- 5 years ago
- Views:
Transcription
1 COMPARATIVE ANALYSIS OF IPV4 & IPV6 IN CLOUD ENVIRONMENT FOR FTP & DATABASE SERVICES Mr. Ammar Rafique**, Mr. Muhammad Waqas Anwar, Mr. Haris Shabbir, Mr. Moazzam Ali Baig, Mr. Rohail Ayaz Computer Science Department NFC-IEFR Faisalabad, Punjab, Pakistan **Corresponding Author: Abstract: Cloud computing is a structure of services which provides its users the access to cloud servers through internet to hire as many services as he/she could. The main focus of this research is on the Internet Protocol versions IPv4 and IPv6. The cloud in computer networks is actually a setup of servers providing different services to the users via internet. In this regard Internet Protocol is back-bone of internet and cloud computing. Internet Protocol is necessary element to route data from a user to the servers of cloud through the internet. In this paper we compare these two internet protocols over the cloud. We will design a scenario on OPNET 14.5 to analyze the results. Keywords: Cloud Computing, IPv4, IPv6, cloud, OPNET Introduction A. CLOUD COMPUTING It's modern technology that provides user access to its servers through the Internet for its services. Cloud just gave us a chance to store our data online. From the definition offered by Cisco we assume the three types of cloud environment, 1) On-Demand: services are the services provided to users when they demand to hire them. 2) On-Scale: services are provided to users according to the payment done by or by the status of the user. For example if user is an organization then the scale of services will be different. 3) Multi-tenant: services are those services which can be allocated to more than one user at a time. B. CLOUD COMPUTING DEPLOYMENT MODELS Cloud computing can be categorized according to its deployment structures. Four main deployment structures or models are described as follows, 1) Public Cloud: is a kind of cloud in which applications are made generally accessible to the public. Clients are hence publically allowed to access and use the services all over the internet We have lots of examples in our real life scenario include Social Networking sites like Face-book, yahoo, Twitter etc. Public Cloud environment is most preferably applicable in those organizational scenarios where number of industries has same kind of needs. 2) Private Cloud: as the name indicates is generally designed for an individual or for personal use. Traditionally it is implemented by a single organization within its own circle. For example the cloud servers within an industry to provide cloud services to its own employees. 3) Community Cloud: Community cloud as its name shows is a set of services between two or more organizations to communicate and share data and programs between them. Let's take an example to explain this community cloud architecture. For example five universities connected with each other to share the computing resources are forming a community cloud. 4) Hybrid Cloud: By getting the mixture of services of public and private cloud the hybrid cloud is formed. In simple words when an organization shares some services on public channel and some on its own private channel then this architecture is called the hybrid cloud. C. SERVICE CLASSIFICATION Cloud computing division w.r.t services is given below, 1) Software as a Service (SaaS): The true meaning of the software as a service is to provide programs on the WWW as a Web service. So that the user can take advantage of the software in the internet browser without downloading and installing NFC-IEFR Journal of Engineering & Scientific Research 5
2 it. The most common examples of SaaS (software as a service) providers are Microsoft and Google 2) Platform as a Service (PaaS): Architecture brings the concept of customizable user platform to build their own applications required. Users do not need to panic about the hardware investment and maintenance expenses. The most common are the providers of PaaS and Windows Azure, Heroku, Force.com. 3) Infrastructure as a Service (IaaS): Infrastructure as a model service users to get more concessions from SaaS and PaaS architectures. The user can define and manage the hardware specifications of the apparatus default provided by the service provider cloud. Often used IAAS are going network and Amazon EC2 Protocol (communication protocol) is a pattern of rules that are applied. So that the device (such as a computer) can perform different functions, especially any communication with each other. Internet Protocol (IP) is the ruler of the Internet. When the hosts (computers) to establish a connection to the Internet, IP address is assigned to them individually. These data packets hosts exchange with each other to communicate with each other. These data packets contain the IP addresses of the source and destination hosts. When the host connects with the other host, it transmits a package with the IP addresses of the source and destination. Internet Protocol version 4 is the title of the 32-bit. It contains 4 octets or unique parts of four sentences, and the total number of IPv4 addresses are (232) = In 1990, the Internet Engineering Task Force saw that the new version of the IP would be needed. Has been the development of Internet Protocol Next Generation (IPng), which was later called Internet Protocol Version 6 IPv6 is a standard protocol layer 2 (WRT TCP / IP Model), which follows IPv4 addresses to communicate over the Internet and other networks. The size of the IPv6 address is 128 bits. we can write address in hexadecimal or binary codes. Therefore, the total number of IP addresses I P v 6 c a n p r o v i d e i s = e It's a large amount of addresses. I. LITERATURE REVIEW H. Zahid, A. Arshad, M. Khalid, B. Saeed and A. Rafique (2013) Descript that the technology, which provides us with a practical computing resources across the Internet all over the world and the socalled cloud computing. This paper covers security issues of DOS attacks on servers cloud by pirates or zombies. J. P. Sahlin, S. Sarkani and T. Mazzuchi (2012) said that there are two types of providers of cloud services, and one is the one that offers cloud services for the purpose of their business and other government institutions that do not want to make a profit from cloud services, but they want to keep the cost as low as possible. Even for both type of cloud service providers and effective way to learn how you can upgrade the system to take advantage and keep the cost without affecting the quality of service (QoS), is a tool OPNET. Gandotra, P. Abrol, P. Gupta, R. Uppal and S. Singh (2011) said that each author's definition of cloud computing is in their own words. Sometimes we feel the confusion which definition is correct. First of all, cloud computing is not a completely new concept it is triggered in 1998 when we started the grid computing and it is also associated with cluster computing. In this paper will be to discuss details about grid computing and cluster computing technology and the future of cloud computing. M. Cotton, L. Vegoda, R. Bonica & B. Haberman (2013) explained that the purpose of their paper is reset block of IPv /24 to IANA. This document is the imposition of IANA to rebuild their records for the purposes of private address of the IPv4 and IPv6. They said that this paper is a product of the Internet Engineering Task Force (IETF). It reflects the IETF community and allows publication by the Internet Engineering Group (IESG) leadership. Result in the publication of this document in the RFC (Request for Comments) No. 4773, and 5736 is no more in function. J. Touch (2013) Wrote that the work ID in IPv4 is to assist the process of breaking up and removing fragmentation during the transmission process. Other quality of this is that it must be different for each packet of data packets, and should retain its NFC-IEFR Journal of Engineering & Scientific Research 6
3 value for the maximum time. If he does so then transfer speed or links will be limited to 6.4 megabits per second. But the normal regulations reflect this limit. Therefore, the purpose of this document is to update No. RFC 791, 2003 and this update is to discuss with the viewpoint of the current use of near field ID addresses IPv4. G. Bhatia, A. Lala and A. Chaurasia (2012) extracted from that cloud computing is somewhat a combination of virtualization and distributed computing and utility computing. Add new networks and the Internet makes it more useful to end users. These days the user has no need to buy expensive computing devices. What he has to do is just to hire a cloud service. Indian Railways (the fourth-largest train system in the world), which carries 30 million humans and 2.8 million ton of luggage a day working at a loss. The reason for this loss is the black market for tickets by employees, passengers and overloading trains without tickets. This paper discusses how to implement cloud computing to solve all these problems, as well as Internet facility in trains. Designed scenario discussed in OPNET simulation. The structure is configured the same scenario all versions of IP (IPv4 and IPv6) to make a comparison between both versions of IP. Research scenario is shown in Figure 1 contains servers that provide cloud database, FTP, and video conferencing services to LAN networks connected to these servers through a network of routers. Each LAN contains 100 customers. All users in these local networks used all types of services. Figure 2 represents a summary of inventory scenario discussed in the design modeler OPNET The parameters we set to measure the performance of IPv4 and IPv6 on the same scenario question the response time of the database service, download the response time of the service FTP, download the response time for the FTP service and end-to-end packet delay for video conferencing service. 2. Research Work OPNET is best tool to do the modeling of networks. With the help of OPNET Modeler, we can judge and check all likelihood after a change in the structure of the network. Fig. 2: Network Inventory Summary 3. Results Analysis Fig. 1: Research Scenario Figure 3 is a graph that represents the query database shows the results of the response time of both scenarios IPv4 and IPv6. It shows that IPv4 is fast in NFC-IEFR Journal of Engineering & Scientific Research 7
4 service to query the database cloud version of IPv6. Figures 4 and 5 show the results of FTP download and upload response times, respectively. IPv6 has demonstrated a delay in responses to a smaller number of cases of IPv4 addresses and IPv4, but the delay was much less of IPv6 on those cases. Graph in Figure 6 describes the end-to-end delay through video conferencing. IPv6 has again put more time delay of IPv4, but in a smaller number of cases. Figure 5: FTP Upload Response Time Figure 3: DB Query Response Time Figure 6: Video Conference End to End Delay 4. Conclusion Figure 4: FTP Download Response Time Considering the simulation, we got graphical results, it is concluded that even if IPv6 is a newer version of IPv4 has advanced features than IPv4, but the larger size of the header caused the delay in the transmission and bulk traffic, such as video conferences delay is much larger than the delay IPv4. So if IPv4 replaced by IPv6 (for cloud services), the first threat that we face is greater delay NFC-IEFR Journal of Engineering & Scientific Research 8
5 in traffic cloud References [1]. G. Bhatia, A. Lala & A. Chaurasia India Implementation of Cloud Computing Technology in Indian Railway Institute of Technology & Sciences, Jabalpur, India. IP CS IT vol. 37, [2]. H. Zahid, A. Arshad, M. Khalid, B. Saeed & A. Rafique Implementation of Cloud Computing over the MAN and Analysis of DOS Attacks Department of Computer Sciences, NFC Institute of Engineering and Fertilizer Research, Faisalabad, Pakistan. International Journal of Science and Advanced Technology (ISSN ). Volume 3 No 10 October [3]. [4]. [5]. [6]. Numbers_Authority [7] I. Gandotra, P. Abrol, P. Gupta, R. Uppal and S. Singh Cloud Computing Over Cluster, Grid Computing [8] J. Touch Updated Specification of the IPv4 ID Field Internet Engineering Task Force (IETF), Category: Standards Track, ISSN: , February [9] J. P. Sahlin, S. Sarkani & T. Mazauchi Optimizing QoS in Distributed Systems / Cloud Computing Architectures' 'Department of Engineering Management and Systems Engineering Washington, D.C Volume 42 No. 18, March [10] M. Cotton, L. Vegoda, R. Bonica & B. Haberman Special-Purpose IP Address Registries Internet Engineering Task Force (IETF), Category: Best Current Practice, ISSN: , April 2013 NFC-IEFR Journal of Engineering & Scientific Research 9
CHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationLoad Balancing Algorithms in Cloud Computing: A Comparative Study
Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool
More informationAbstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a
Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most
More informationI. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25
RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,
More informationCS 520: Network Architecture I Winter Lecture 11: NAT and IPv6
CS 520: Network Architecture I Winter 2007 Lecture 11: NAT and IPv6 The previous lecture discussed how subnetting and supernetting (CIDR) can be used to make better use of global IP addresses. This lecture
More informationKusum Lata, Sugandha Sharma
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationPerformance Comparison of Internet Protocol v4 with Internet Protocol v6
Performance Comparison of Internet Protocol v4 with Internet Protocol v6 Mrs. Sheetal Mali Department of Electronics and Telecommunication Parvatibai Genba Sopanrao Moze College of Engineering Wagholi,
More informationUsage of Honeypot to Secure datacenter in Infrastructure as a Service data
Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)
More informationData Centers and Cloud Computing
Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationIPv4 to IPv6 Network Migration and Coexistence
IPv4 to IPv6 Network Migration and Coexistence A.Chandra 1, K. Lalitha 2 1 Assistant Professor, Department of CSSE, Sree Vidyanikethan Engg. College, Tirupati, Andhra Pradesh, India 2 Assistant Professor(SL),
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationCloud Computing and Its Security Issues - A Review
Cloud Computing and Its Security Issues - A Review Jitender Grover 1,Shikha 2, Mohit Sharma 3 1, 2, 3 Department of Computer Science & Engineering, M. M. University, Sadopur, Ambala, India 1 jitendergrover0101@gmail.com,
More informationNETWORK LAYER: IP Addressing
NETWORK LAYER: IP Addressing McGraw-Hill The McGraw-Hill Companies, Inc., 2004 2000 Position of network layer McGraw-Hill The McGraw-Hill Companies, Inc., 2004 Network layer duties McGraw-Hill The McGraw-Hill
More informationFaculté Polytechnique
Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and
More informationA Comparative Study of Various Computing Environments-Cluster, Grid and Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationCS 6393 Lecture 10. Cloud Computing. Prof. Ravi Sandhu Executive Director and Endowed Chair. April 12,
CS 6393 Lecture 10 Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair April 12, 2013 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1 The Cloud The Network is the Computer - Sun
More informationCloud Computing. Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative
Grace A. Lewis Research, Technology and Systems Solutions (RTSS) Program System of Systems Practice (SoSP) Initiative SEI Webinar November 12, 2009 Polling Question 1 How did you hear about this webinar?
More informationData Centers and Cloud Computing. Slides courtesy of Tim Wood
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationCLOUD COMPUTING ABSTRACT
Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationComparison of QoS Performance Over WLAN, VoIP4 and VoIP6
Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one
More informationInternet Engineering Task Force (IETF) Request for Comments: 6441 BCP: 171 November 2011 Category: Best Current Practice ISSN:
Internet Engineering Task Force (IETF) L. Vegoda Request for Comments: 6441 ICANN BCP: 171 November 2011 Category: Best Current Practice ISSN: 2070-1721 Abstract Time to Remove Filters for Previously Unallocated
More informationData Centers and Cloud Computing. Data Centers
Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet
More informationA Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)
A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan
More informationOnline Editor for Compiling and Executing Different Languages Source Code
Online Editor for Compiling and Executing Different Languages Source Code Ratnadip Kawale 1, Pooja Soni 2,Gaurav Suryawanshi 3 & Prof.Pradip Balbudhe 4 1 VIII Sem, B.E,.CE,Suryodaya College of Engg. &
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationPerformance Analysis for Channel Utilization in Wireless LAN
Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people
More informationRequest for Comments: 5569 Category: Informational January 2010 ISSN:
Independent Submission R. Despres Request for Comments: 5569 RD-IPtech Category: Informational January 2010 ISSN: 2070-1721 Abstract IPv6 Rapid Deployment on IPv4 Infrastructures (6rd) IPv6 rapid deployment
More informationIDS in Cloud Environment as Service Based Manner
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 273-278 International Research Publications House http://www. irphouse.com /ijict.htm IDS
More informationAccess Control Lists and IP Fragments
Access Control Lists and IP Fragments Document ID: 8014 Contents Introduction Types of ACL Entries ACL Rules Flowchart How Packets Can Match an ACL Example 1 Example 2 fragments Keyword Scenarios Scenario
More informationIP Multicast Addressing
APPENDIX B Multicast delivery is enabled by setting up a multicast address on the Content Engine in the form of a multicast cloud configuration to which different devices, configured to receive content
More informationInternet Engineering Task Force (IETF) Category: Standards Track. S. Krishnan Ericsson October 2015
Internet Engineering Task Force (IETF) Request for Comments: 7676 Category: Standards Track ISSN: 2070-1721 C. Pignataro Cisco Systems R. Bonica Juniper Networks S. Krishnan Ericsson October 2015 IPv6
More informationFixed Innovative Bandwidth Utilization in TDM EPON
634 Fixed Innovative Bandwidth Utilization in TDM EPON Muhammad Bilal 1, Muhammad Awais 2, Muhammad Irfan 3, Ammar Rafiq 4 1 Department of Computer Science, NFC Institute of Engineering & Fertilizer Research,
More informationAssistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 7 ISSN : 2456-3307 An Architectural Framework of Cloud Computing behind
More informationMigration to IPv6 from IPv4. Is it necessary?
Introduction Today Internet plays a big role in every aspect of our lives and IP acted as an important pillar of Internet. Since its inception the Internet has reached almost all corners of globe and it
More informationA Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo
A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo Abstract: Load Balancing is a computer networking method to distribute workload across
More informationLecture 02. Ecommerce, EC Classification, Web, HTTP connections & Networks
Lecture 02 Ecommerce, EC Classification, Web, HTTP connections & Networks Mr. Mubashir Ali Lecturer (Dept. of dr.mubashirali1@gmail.com 1 Outline 1. What is Ecommerce 2. EC Classification 3. The Web 4.
More informationSimulation of Cloud Computing Environments with CloudSim
Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.
More informationIPv6. Dispelling the Magic
IPv6 Dispelling the Magic Board Chairman RIPE NCC 1 Why the Title? 96 more bits. No Magic Gaurab Raj Upadhaya 2 Agenda RIPE NCC Background to IPv6 History of IPv6 Why Deploy Ipv6? Where are we Conclusions
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationThis tutorial will help you in understanding IPv4 and its associated terminologies along with appropriate references and examples.
About the Tutorial Internet Protocol version 4 (IPv4) is the fourth version in the development of the Internet Protocol (IP) and the first version of the protocol to be widely deployed. IPv4 is described
More informationCLOUD COMPUTING: SEARCH ENGINE IN AGRICULTURE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationA Survey On Load Balancing Methods and Algorithms in Cloud Computing
International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-5, Issue-4 E-ISSN: 2347-2693 A Survey On Load Balancing Methods and Algorithms in Cloud Computing M. Lagwal 1*,
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More informationPROFITBRICKS IAAS VIRTUAL DATA CENTER. An Introduction to ProfitBricks VDC
PROFITBRICKS IAAS VIRTUAL DATA CENTER An Introduction to ProfitBricks VDC Why Cloud Computing? In the future, it will be difficult for IT service providers to avoid the subject of cloud computing. Still
More informationIPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network
White Paper IPv6 Rapid Deployment: Provide IPv6 Access to Customers over an IPv4-Only Network What You Will Learn IPv6 Rapid Deployment (6rd) (RFC 5969) 6rd is a stateless tunneling mechanism which allows
More informationMANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014
Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department
More informationSimulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application
Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh, Shaheed Bhagat Singh State Technical Campus, Ferozepur,
More informationIntroduction to Computer Networks. CS 166: Introduction to Computer Systems Security
Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet
More information11:1 Anonymous Internet Access Method for Wireless Systems
11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction
More informationEmbracing a Secure Cloud. Cloud & Network Virtualisation India 2017
Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationIP Addressing Week 6. Module : Computer Networks Lecturer: Lucy White Office : 324
IP Addressing Week 6 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 1 Addressing: Network & Host Network address help to identify route through the network cloud Network address
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationComparative Analysis of Two Prominent Routing Protocols in IPv6 Network: OSPFv3 & EIGRPv6
International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Comparative Analysis of Two Prominent Routing Protocols
More informationLink download full: Test Bank for Business Data Networks and Security 9th Edition by Panko https://digitalcontentmarket.org/download/business-data-networks-and-security-9thedition-by-panko/ Business Data
More informationMIT International Journal of Electrical and Instrumentation Engineering Vol. 3, No. 1, Jan. 2013, pp
MIT International Journal of Electrical and Instrumentation Engineering Vol. 3, No. 1, Jan. 2013, pp. 15 20 15 MPLS and NGN Networks: The Future Aspects for Railways Communication System Alok Pandey E,
More informationCCNA Questions/Answers IPv6. Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B :2:11.1 C.
Select the valid IPv6 address from given ones. (Choose two) A. FE63::0043::11:21 B. 191.2.1.2:2:11.1 C. 2001::98 D. 2002:c0a8:101::42 E. :2001:: F. 2002.cb0a:3cdd:1::1 Answer: C, D. 2013 1 Which method
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationPerformance Analysis of Routing Protocols in MANETs Using OPNET 14.0
Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Karanveer Singh 1, Naveen Goyal 2 1 Research Scholar,ECE Deptt.,Bhai Gurdas Institute of Engineering and Technology, Sangrur 2 Assistant
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationMoving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop
Moving to computing are auditors ready for the security challenges? Albert Otete CPA CISA ISACA Uganda Workshop 10.08.2011 What is computing? Examples of service providers Computing preface Cloud computing
More informationChapter 8: Subnetting IP networks. Introduction to Networks v5.1
Chapter 8: Subnetting IP networks Introduction to Networks v5.1 8.0 Introduction 8.1 Subnetting an IPv4 Network 8.2 Addressing Schemes 8.3 Design Considerations for IPv6 8.4 Summary 2013 Cisco and/or its
More informationArchitectural Implications of Cloud Computing
Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,
More informationLoad Balancing in Cloud Computing System
Rashmi Sharma and Abhishek Kumar Department of CSE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India E-mail: abhishek221196@gmail.com (Received on 10 August 2012 and accepted on 15 October 2012)
More informationCLOUD COMPUTING & ITS LOAD BALANCING SCENARIO
CLOUD COMPUTING & ITS LOAD BALANCING SCENARIO Dr. Naveen Kr. Sharma 1, Mr. Sanjay Purohit 2 and Ms. Shivani Singh 3 1,2 MCA, IIMT College of Engineering, Gr. Noida 3 MCA, GIIT, Gr. Noida Abstract- The
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationMIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE
MIGRATION OF INTERNET PROTOCOL V4 TO INTERNET PROTOCOL V6 USING DUAL-STACK TECHNIQUE 1 SHEETAL BORSE, 2 MRUDUL DIXIT 1,2 Department of Electronics and Telecommunication, Cummins College of Engineering
More informationVolume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 Design of Architecture for Efficient
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationUsing ICMP to Troubleshoot TCP/IP Networks
Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationMiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101
More informationMapping of Address and Port Using Translation
The feature provides connectivity to IPv4 hosts across IPv6 domains. Mapping of address and port using translation (MAP-T) is a mechanism that performs double translation (IPv4 to IPv6 and vice versa)
More informationEfficient Data Distribution in CDBMS based on Location and User Information for Real Time Applications
ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Efficient Data Distribution in CDBMS based on Location and User Information for Real
More informationDESIGN AND IMPLEMENTATION OF IPV4 ROUTING INFORMATION PROTOCOL
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) Vol. 1, Issue 3, Aug 2013, 51-56 Impact Journals DESIGN AND IMPLEMENTATION OF IPV4 ROUTING INFORMATION PROTOCOL SARBJEET
More informationA Review Paper on Routing Protocols in Wireless Sensor Networks
A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,
More informationLOGICAL ADDRESSING. Faisal Karim Shaikh.
LOGICAL ADDRESSING Faisal Karim Shaikh faisal.shaikh@faculty.muet.edu.pk DEWSNet Group Dependable Embedded Wired/Wireless Networks www.fkshaikh.com/dewsnet IPv4 ADDRESSES An IPv4 address is a 32-bit address
More informationD. Suresh Kumar, E. George Dharma Prakash Raj
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 18 IJSRCSEIT Volume 3 Issue 1 ISSN : 2456-37 A Comparitive Analysis on Load Balancing Algorithms
More informationQueuing Mechanisms to improve QoS for VOIP over IPv4 and MPLS networks
Queuing Mechanisms to improve QoS for VOIP over IPv4 and MPLS networks Sumera Saleem Mansoor Ahmed Tahir Abstract In this paper, an implementation of different Queuing mechanisms over MPLS network for
More informationPerformance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data
ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive
More informationDistributed System Framework for Mobile Cloud Computing
Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey
More informationInternet Engineering Task Force (IETF) Request for Comments: March 2012
Internet Engineering Task Force (IETF) Request for Comments: 6549 Updates: 2328 Category: Standards Track ISSN: 2070-1721 A. Lindem Ericsson A. Roy S. Mirtorabi Cisco Systems March 2012 OSPFv2 Multi-Instance
More informationInternet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track. October 2015
Internet Engineering Task Force (IETF) Request for Comments: 7660 Category: Standards Track ISSN: 2070-1721 L. Bertz S. Manning Sprint B. Hirschman October 2015 Diameter Congestion and Filter Attributes
More informationEfficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security
Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security ABSTRACT Muhammad Wasim Abbas Ashraf * & Ahsan Raza Sattar ** *Computer Science, University of Agriculture, Faisalabad, Punjab,
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationSOSPG1: IPv6, Tomorrow s Network Here Today. Session Overview. In the beginning 8/8/2011
SOSPG1: IPv6, Tomorrow s Network Here Today. Mark Brophy, I.T. Director, Rogers Townsend & Thomas Jim Small & Craig Weinhold CDW Advanced Technology Services Session Overview Brief review of the characteristics
More informationDiscriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric
Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,
More informationMapping of Address and Port (MAP) an ISPs Perspective. E. Jordan Gottlieb Principal Engineer Charter Communications
Mapping of Address and Port () an ISPs Perspective E. Jordan Gottlieb Principal Engineer Charter Communications jordan.gottlieb@charter.com Agenda What is? Benefits of in Action Algorithms in Action Deployment
More informationCompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
More informationRe-allocation of Tasks according to Weights in Cloud Architecture
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.727
More informationCHAPTER-2 IP CONCEPTS
CHAPTER-2 IP CONCEPTS Page: 1 IP Concepts IP is a very important protocol in modern internetworking; you can't really comprehend modern networking without a good understanding of IP. Unfortunately, IP
More information