International Journal of Research In Science & Engineering e-issn: Special Issue: Techno-Xtreme 16 p-issn:

Size: px
Start display at page:

Download "International Journal of Research In Science & Engineering e-issn: Special Issue: Techno-Xtreme 16 p-issn:"

Transcription

1 Cloudlet Scheduling To Optimize Cloud Computing With Wireless Sensor Network Miss. P.P.Ingale, Prof. R. N. Khobragade, Dr. V. M. Thakare Dept. CS & IT, SGBAU, Amravati, India. Dept. CS & IT, SGBAU, Amravati, India. Dept. CS & IT,SGBAU, Amravati, Abstract: Connecting mobile devices with the cloud, suffers from high network latency and the huge transmission power consumption. Main obstacle for today s mobile devices is lack of resource, and requires increasing the processing power of device, increasing memory capacity, a need for greater durability of the battery etc. Cloud computing is one of the most recently developed models of network computing that provide services over network on demands. cloud are highly adapted in present day computing but real issues regarding performance, reliability, and security still exist in such complex systems. One of the main issues is regarding the pay-per-use concept of the clouds that may be affected by underutilization of the reserved resources by a single user. So even the cloud suffers from underutilization but per user s reserved resources, not per data center as a whole. Therefore, the maximization of system utilization while simultaneously minimizing makespans is of great interest to cloud users wishing to reduce usage costs through the decrease of usage time. This paper proposes, a cloudlet scheduling method inside the CloudSim able to maximize the resource utilization and minimize the makespan. Additionally Localization method optimizes the power consumption during a trilateration-based localization procedure through the adjustment of sensor node s output power level. Keywords: cloudlet scheduling, CloudSim, Localization, makespans, resource utilization. 1. Introduction: Mobile devices such as tablets, smart phones have become an essential part of day to day life. Users depends on them to make calls, access online social networking sits, create and edit documents, organizing meetings and make video/audio calls, perform image processing operations and so on. But the main obstacle for today s mobile device are lack of resources, and they requires increasing the processing power of device, increasing memory capacity, a need for greater durability of the battery etc. One solution to overcome these problems is to integrate cloud computing technology with mobile devices which is called as mobile cloud computing. This paper introduces cloudlet scheduling method by using CloudSim which is able to maximize the resource utilization. Problem of using the cloud is the under utilization of the reserved resources, which causes longer makespans and higher usage cost. Also, the optimization of sensor node s power consumption, WSN, is very critical due to the fact that sensor nodes are small in size and have constrained resources in terms of power/energy, connectivity and computational power. This paper concern on how cloud computing system with WSNs can take advantages of computational intelligent (CI) techniques using single-or-multi-objective particle swarm optimization (PSO), with an overall aim of concurrently minimizing makespans, localized time, energy consumption during localization and maximizing the number of nodes fully localized. Two optimization methods are applied to the Cloud scheduling; in order to decrease the execution time of tasks (Cloudlets) on the cloud, and to WSN localization problem; in order to find optimal solutions while optimizing the power consumption of the whole network. 2. Background: The study of mobile cloud computing discusses the most relevant mobile cloud computing and cloudlets techniques developed in recent years with their challenges. The MCC concept with the proposed Cloudlet framework are integrated and a new scalable framework for the MCC model is proposed which reduces the power consumption of the mobile devices as well as reducing the communication latency when the mobile device request a job to be performed remotely while satisfying the high quality of service requirements. In the cloudlet-based mobile computing, mobile devices send jobs to the cloudlet to perform the required processing and return the final result back, this reduces the transmission delay, also reduces the power consumption of the mobile device. So it makes a great evolution in MCC [1]. Discussions on cloudlet challenges explained the importance of using Cloudlets in our everyday life, by presenting the main challenges and possibilities of further research. Also presented a short introduction about Cloudlets; the cloudlets architecture and the way they operate and discuss about what their features are, how they work with thin and tick clients, and how they operate as offload element [2].

2 PacketCloud: a Cloudlet-based open platform for in network services, which shares in network services, while satisfies a number of practical requirements to obtain result of efficiently share a set of commodity servers among different services, and serve the network traffic in an elastic way. A cloudlet is a general-purpose cluster consisting of a set of commodity servers, and it can host in-network services. In each cloudlet, commodities server can be efficiently shared among different services, and accordingly achieve an elastic resource allocation for each deployed service. The use of PacketCloud will provide a cost-effective replacement of existing middleboxes, also get third-party application/content provider close to end users. Different from specialized middleboxes, available resources are required to be shared among different services. To serve the highly dynamic network traffic, PacketCloud is designed to host elastic in network services [3]. PacketCloud, a cloudlet-based open platform to host elastic in-network services, discussed how PacketCloud can help both Internet Service Providers (ISPs) and emerging application/content providers deploy their services to strategic network locations [4]. Metropolitan areas have a high population density, meaning that cloudlets will be accessible to a large number of users. This improves the cost-effectiveness of cloudlets as they are less likely to be idle. Also due to the size of the network, WMAN service providers can take advantage of economies of scale when offering cloudlet services through the WMAN, making cloudlet services more affordable to the general public [5]. This paper used CloudSim to implement cloudlet scheduling method. CloudSim is a simulator tool that allows testing the performance of provisioning policies in a repeatable and controllable environment. CloudSim is a library for the simulation of cloud scenarios. It provides essential classes for describing data centers, computational resources, virtual machines, applications, users, and policies for management of various parts of system like scheduling and provisioning. This Paper organized as follows Section 1 Introduction. Section 2 discusses Background. Section 3 discusses previous work done. Section 4 discusses existing methodology. Section 5 discusses analysis and discussion. Section 6 proposed method Section 7 outcome possible result. Finally section 8 concludes this review paper and Section 9 related future works. 3. Previous Work Done: Author Yaser Jararweha et al. (2014) [1] proposed a new MCC cloudlet-based model is composed of a set of distributed and well connected cloudlets within one location where most mobiles use cloud services. All of these cloudlets connected to the Enterprise remote cloud. The mobile device directly communicates with the cloudlet which is connected to the Enterprise cloud. In some cases, the mobile device will need to connect to the enterprise cloud, even if the cloudlets are available. In one case, the device need to access a file stored in the Enterprise Cloud. In another case, the mobile device will need to access services that are not available in the Cloudlet. Author Aleksandar Bahtovski et al. (2014) [2] proposed the cloudlet architecture. This can be explained as a high level architecture for code offloading in a hostile environment. Cloudlets are the middle element in a threetier architecture i.e. intermediate layer between the cloud infrastructure and the mobile device. The other end of the architecture includes offload elements for mobile device cloudlet. They are located close to the mobile devices they serve. This architecture decreases latency by using a single-hop network and potentially lowers the battery consumption by using Wi-Fi or short-range radio instead of broadband wireless, which typically consumes more energy. The usage of VM (Virtual Machine) in cloudlets enables clean separation. The complex problem of configuring software on the cloudlet to service mobile devices is avoided. Instead, the problem is transformed into a simpler problem of rapidly delivering a precisely preconfigured VM to the cloudlet. A VM cleanly encapsulates and separates a transient guest software environment from the permanent host software environment of the cloudlet infrastructure. In a hostile environment, efficient dissemination of VM to the cloudlet is a major challenge. Author Yang Chen et al. (2015) (2013) [3,4] proposed a cloudlet is a functional unit in the resource pool to exchange data with the Internet; every cloudlet has a co-located front-end router (or switch). The router checks against every packet, and see if it is related to any deployed in-network service on the co-located cloudlet. If so, the packet will be forwarded to the cloudlet for further processing. A cloudlet is composed of a cloudlet controller, and a number of commodity servers, called computation nodes. The cloudlet controller is a general purpose server, and is responsible for the resource allocation and management of all nodes within the cloudlet. The cloudlet controller actively monitors the resources of every computation node, and reports to the ISP-wide resource scheduler periodically. The computation nodes are used for hosting in-network services. Virtualization is necessary to provide isolation among them, and a computation node can host multiple Virtual instances (VIs) simultaneously. PacketCloud supports multiple types of VIs. Each type has a specified resource capacity. A VI can host general purpose in-network services subject to its resource constraint. Author Mike Jia et al. (2015)[5] proposed the strategic placement of a limited number of cloudlets in a WMAN (a wireless metropolitan area network) can significantly improve the performance of mobile user applications

3 and device an algorithm for the problem, which enables the placement of the cloudlets at user dense regions of the WMAN, and assigns mobile users to the placed cloudlets while balancing their workload. 4. Existing methodology: A new MCC cloudlet-based model is composed of a set of distributed and well connected cloudlets within one location where most mobiles use cloud services. All of these cloudlets are connected to the Enterprise remote cloud. The mobile device directly communicates with the cloudle. In some cases, the mobile device will need to connect to the enterprise cloud, even if the cloudlets are available. In one case, the device need to access a file stored in the Enterprise Cloud. In another case, the mobile device will need to access services that are not available in the Cloudlet [1]. In cloudlet architecture Cloudlet are the middle element in a three-tier architecture i.e. intermediate layer between the cloud infrastructure and the mobile device. The heart of this architecture is a large central core, which can be implemented as one of the Amazon s, Microsoft s, Google s data centres or private enterprise clouds. The other end of the architecture includes offload elements for mobile devices cloudlets. They are located close to the mobile devices they serve [2]. In PacketCloud, the small size of the cloudlets allows ISPs to deploy in-network services in a number of network locations, e.g., PoPs (point of presences). Even a small ISP can deploy multiple cloudlets in its PoPs. PacketCloud allows deployed in-network services to be activated in two different ways. A service provider can let the public know the network address of a deployed service. These types of services are denoted as visible services. On the other hand, a service provider can choose to sniff or even modify the traffic on-the-fly, without the awareness of end users. This type of services are invisible to end users, known as transparent services [3][4]. A simple Heaviest-AP First (HAF) algorithm and A Density-Based Clustering (DBC) algorithm, those two heuristic algorithms are used for the K cloudlet placement problem and user-to-cloudlet assignment in a WMAN, to reduce the average wait time of offloaded task [5]. PSO is a population-based search algorithm, where each particle learns from its neighbors and itself during the time it travels in space. PSO algorithm start by creating a number of particles to form a swarm that travels in the problem space searching for an optimum solution. An objective function should be defined to examine every solution found by each particle throughout the traveling time. The individuals in PSO are a group of particles that move through a search space with a given velocity [6]. Equations 1 to 3 are used to update the velocity of the ith component of particle, where 4 and 5 are used to update the position of that same component. (1) (2) (3) (4) p = (5) PSO will initialize swam of particles where each particle will have a velocity and positions vector, the complete pseudo code is shown in Algorithm. 1.

4 Algorithm 1: BSOPSO pseudo code 5. Analysis and discussions: In the cloudlet-based mobile computing, mobile devices send jobs to the cloudlet to perform the required processing and return the final result back, this reduces the transmission delay, also reduces the power consumption of the mobile device. Using cloudlets would be of great benefit for mobile service customers, especially if they want to use an application that requires resources that the customer s mobile device doesn t have at the moment. To serve the highly dynamic network traffic, PacketCloud is designed to host elastic in network services. As an open platform, security is very important as deployed services might be unstable, or even malicious. PacketCloud must be robust to different kinds of service failures and malicious attacks. packetcloud introduce a small additional delay for in network services. Although PacketCloud is designed for handling high throughput traffic, still, a cloudlet s processing capability is not as high as a public data center. PacketCloud is able to host elastic in-network services to serve the dynamic Internet traffic. There are several issues need to consider in the design those are unexpected service failures, malicious demultiplexing rules, malicious services and Excessive resource usage. Due to the size of the network, WMAN service providers can take advantage of economies of scale when offering cloudlet services through the WMAN, making cloudlet services more affordable to the general public. However, if consider the use of cloudlets in Wireless Metropolitan Area Networks (WMANs), the problem of placement becomes much more significant. Following table summarizes discussions of above methods. Methods Advantages Disadvantages Cloudlet-base mobile computing Reduce transmission delay during processing and return of result back. Reduce power consumption. Cloudlet architecture PacketCloud PacketCloud Cloudlets WMAN in Ability to work with thin and tick client. Operated as offload element. architecture decreases latency by using a single-hop network and potentially lowers the battery consumption by using Wi-Fi or Short-range radio instead of broadband wireless. Serve highly dynamic network traffic. Designed to host elastic in network services. Robust to different kinds of service failures and malicious attacks. Help both internet service provider (ISPs) and emerging application/content providers. Compatible with different underlying network architecture including today s internet protocol. Making cloudlet services more affordable to the general public. High population density. Required large network to build three architectural model and using real testbed. Architecture wants to use an application that requires resources that the customers mobile device doesn t have at that time. Cloudlet s processing capability is not as high as a public data center. Unexpected service failures, Malicious demultiplexing rules, Malicious services and Excessive resource usage. Unexpected service failures, Malicious demultiplexing rules, Malicious services and Excessive resource usage. The problem of placement becomes much more significant. In HAF the APs with the heaviest workload are not always the closest ones to their users. And lead to uneven distribution of users to cloudlet. In DBC algorithm there is issue how to prioritize candidate users for assignment to the cloudlet

5 Table1: Comparative analysis of various cloudlet methods. 6. Proposed Methodology: Optimization algorithm is truly complex procedures that consider many elements when optimizing a specific problem. Cloud computing and wireless sensor networks are full of optimization problem that need to be solved. Cloudlet scheduling with cloud computing system and WSNs proposed to take advantages of computational intelligent techniques using single-or-multi-objective particle swarm optimization, with an overall aim of concurrently minimizing makespans, localized time, and energy consumption during localization and maximizing the number of nodes fully localized. A cloudlet scheduling inside the CloudSim is able to maximize the resource utilization and minimize the makespan. Additionally the localization method optimized the power consumption during a trilateration-based localization procedure through the adjustment of sensor node s output power level. Makespan, Utilization, and Scheduling: Makespan is the total time the network resources take to finish executing all the tasks or jobs, and utilization is the measure of how well the overall capacity of the cloud is used. Cloudlet Scheduling: scheduling in CloudSim is done at the node level; there are two different scheduling algorithms in two different levels of the software: the VM level and the host level. The provisioning scenarios use space-shared and time-shared policies for VMs and task units. Using the space-shared policy allows one VM or cloudlet to be executed at a given moment of time. On the contrary, using the time-shared policy allows multiple cloudlets to multi-task within a VM and will allow VMs to multi-task and run simultaneously within a host, in case time-shared was used in the two aforementioned levels. VMs will be allocated to hosts on a FCFS basis. The simple brokering will iterate through all cloudlets then assign them to the available VMs one by one. For example, if we have two VMs and three cloudlets, the broker will assign the first VM to run the first cloudlet, the second VM to run the second cloudlet, and then will start again with the first VM by assigning it to run the third cloudlet. CloudSim Network Topology: CloudSim tool starts by creating a network of nodes as illustrated in Figure 1. A basic node consists of data centers, hosts, and cloud brokers. Data centers (resource providers in CloudSim) are created first with specifications that define the operating system, memory, bandwidth, storage, etc. One or more hosts are then created on each data center with the proper specification of RAM, storage, bandwidth, processing elements, and the selection of the scheduling algorithm to schedule virtual machines (VMs) inside the host. Processing elements are known as cores or CPUs, where each processing element is given a defined processing power measured in millions of instructions per second (MIPS). Hosts are managed by data centers where each data center may manage a single or numerous hosts. The cloud broker, \an entity that creates and maintains relationship with multiple cloud service providers", is also created to distribute work among the available data centers or cloud services, which make a cloud, broker the middleware subsystem in charge of the relationship between users and cloud service providers. VM1 Data Center 1 Host 1 VM1 VM Cloudlet 1 Cloudlet n Cloudlet Host X VM y Cloudlet Z VM Scheduling Cloudlet Scheduling

6 Figure 1: CloudSim Network Topology After creating all of the network nodes of CloudSim, VMs are created in order to run on the specified hosts. A scheduling algorithm should be chosen to schedule cloudlets inside the VM, so scheduling is done at the host and VM levels. The last step in this process is the generation of tasks (aka. cloudlets) either by initializing them through code or from existing workload traces. Cloudlets are defined based on specifications that define the task length in millions of instructions (MI), needed number of processing elements, and a utilization model that states the cloudlet's execution rate through defining the current requested MIPS from the processing elements. When generating cloudlets from workload traces, the workload format should be checked to make sure that it follows the standard workload format described. Cloudlets' length should also be converted to MI instead of the standard's execution time in seconds, and that is achieved by multiplying the execution time by the execution rate, where the default execution rate in CloudSim is 1 MIPS. For example, a cloudlet with an execution time of 10 seconds is converted to 10 MI. Finally, after creating network nodes, VMs, and cloudlets, the list of the available VMs and cloudlets are submitted to the cloud broker to assign each cloudlet to run on a specific VM based on the brokering policy. Wireless Sensor Network: Trilateration-based and multilateration-based localization (TBL & MBL) techniques are among the best known and most used methods for localization. WSNs are use to reduce the overall power consumption of the localization process without affecting the localization time or localizability (i.e. the number of localized nodes). Each node in the WSN can eventually be localized with the help of three already localized neighbor nodes that a node can communicate with over 1-hop connections. Two nodes are said to have a 1-hop connection if the distance between them is less than or equal to the transmission range, R. The localization procedure is the step that precedes actual network transmissions which, in the long run, will help in data forwarding and routing procedures between nodes in the network. The proposed method involves the use of single and multi-objective PSO to choose the appropriate, discrete or continuous output power level for each wireless sensor node. PSO was used in order to optimize various single or combinations of objectives including localization time, messages sent during localization, and the power consumed. 7. Outcomes And Possible Result: Cloudlet scheduling with PSO advancing work of the brokers, which will be maximize the resource utilization and minimize the makespans. 8. Conclusion: The study of mobile cloud computing discusses the most relevant mobile cloud computing and cloudlets techniques developed in recent years with their challenges. Connecting mobile devices with the cloud suffers from the high network latency and the huge transmission power consumption and lack of resources, and they requires increasing the processing power of devices, increasing memory capacity, a need for greater durability of the battery etc. A cloudlet scheduling method inside the CloudSim is able to maximize the resource utilization and minimize the makespan. Additionally the localization methods optimized the power consumption during a trilateration-based localization procedure through the adjustment of sensor node s output power level. 9. Future Scope: In future Different CI methods can be implemented; then, the performance of them can be tested and compared with the performance and quality of the solutions by the PSO-based variants. The cloudlet scheduling method showed great opportunity for optimizing single user makespans. However, a more complex and realistic virtualized cloud environment can be created to test the method with multi-user and real cloudlets. The work can be further extended by implementing different localization protocols. References: [1]Yaser Jararweha, Lo'ai Tawalbehb, Fadi Ababneha, Abdallah Khreishahc*, Fahd Dosari Scalable Cloudletbased Mobile Computing Model Science direct(mobispc-2014) Page no [2]Aleksandar Bahtovski, Marjan Gusev, Cloudlet Challenges volume no. 69, page no ScienceDirect 2014.

7 [3] Yang Chen, Member, IEEE, Yu Chen, Qiang Cao, and Xiaowei Yang PacketCloud: a Cloudlet-based Open Platform for In-network Services IEEE transactions on parallel and distributed systems vol. pp. no. 99. page no April 2015 [4]Yang Chen1, Bingyang Liu, Yu Chen1, Ang Li, Xiaowei Yang, Jun Bi PacketCloud: an Open PlatformforElasticInnetworkService MobiArch 13,October4,2013,Miami,Florida,USA copyright 2013 ACM. [5]Mike Jia, Jiannong Cao, Fellow, IEEE, and Weifa Liang Senior Member, IEEE Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless Metropolitan Area Networks IEEE transactions on cloud computing, vol. x, no. x, xx [6] Book: Artificial Intelligence and Intelligent System by N. P. Padhy. OXFORD edition, page no

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

A QoS Load Balancing Scheduling Algorithm in Cloud Environment A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in

More information

ScienceDirect. Cloudlet Challenges

ScienceDirect. Cloudlet Challenges Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 69 ( 2014 ) 704 711 24th DAAAM International Symposium on Intelligent Manufacturing and Automation, 2013 Cloudlet Challenges

More information

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud 571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,

More information

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT

CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have

More information

Improving QoS Parameters for Cloud Data Centers Using Dynamic Particle Swarm Optimization Load Balancing Algorithm

Improving QoS Parameters for Cloud Data Centers Using Dynamic Particle Swarm Optimization Load Balancing Algorithm Improving QoS Parameters for Cloud Data Centers Using Dynamic Particle Swarm Optimization Load Balancing Algorithm Bharti Sharma Master of Computer Engineering, LDRP Institute of Technology and Research,

More information

Task Scheduling Algorithm in Cloud Computing based on Power Factor

Task Scheduling Algorithm in Cloud Computing based on Power Factor Task Scheduling Algorithm in Cloud Computing based on Power Factor Sunita Sharma 1, Nagendra Kumar 2 P.G. Student, Department of Computer Engineering, Shri Ram Institute of Science & Technology, JBP, M.P,

More information

Simulation of Cloud Computing Environments with CloudSim

Simulation of Cloud Computing Environments with CloudSim Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.

More information

Optimizing cloudlet scheduling and wireless sensor localization using computational intelligence techniques

Optimizing cloudlet scheduling and wireless sensor localization using computational intelligence techniques The University of Toledo The University of Toledo Digital Repository Theses and Dissertations 2014 Optimizing cloudlet scheduling and wireless sensor localization using computational intelligence techniques

More information

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING

ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING ENERGY EFFICIENT VIRTUAL MACHINE INTEGRATION IN CLOUD COMPUTING Mrs. Shweta Agarwal Assistant Professor, Dept. of MCA St. Aloysius Institute of Technology, Jabalpur(India) ABSTRACT In the present study,

More information

Figure 1: Virtualization

Figure 1: Virtualization Volume 6, Issue 9, September 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Profitable

More information

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Rinku Sharma 1, Dr. Rakesh Joon 2 1 Post Graduate Scholar, 2 Assistant Professor, Department of Electronics and Communication

More information

Distributed System Framework for Mobile Cloud Computing

Distributed System Framework for Mobile Cloud Computing Bonfring International Journal of Research in Communication Engineering, Vol. 8, No. 1, February 2018 5 Distributed System Framework for Mobile Cloud Computing K. Arul Jothy, K. Sivakumar and M.J. Delsey

More information

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE

CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 143 CHAPTER 6 STATISTICAL MODELING OF REAL WORLD CLOUD ENVIRONMENT FOR RELIABILITY AND ITS EFFECT ON ENERGY AND PERFORMANCE 6.1 INTRODUCTION This chapter mainly focuses on how to handle the inherent unreliability

More information

Dynamic Task Scheduling in Cloud Computing Based on the Availability Level of Resources

Dynamic Task Scheduling in Cloud Computing Based on the Availability Level of Resources Vol. 1, No. 8 (217), pp.21-36 http://dx.doi.org/1.14257/ijgdc.217.1.8.3 Dynamic Task Scheduling in Cloud Computing Based on the Availability Level of Resources Elhossiny Ibrahim 1, Nirmeen A. El-Bahnasawy

More information

LOAD BALANCING IN CLOUD COMPUTING USING ANT COLONY OPTIMIZATION

LOAD BALANCING IN CLOUD COMPUTING USING ANT COLONY OPTIMIZATION International Journal of Computer Engineering & Technology (IJCET) Volume 8, Issue 6, Nov-Dec 2017, pp. 54 59, Article ID: IJCET_08_06_006 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=8&itype=6

More information

Network-Aware Resource Allocation in Distributed Clouds

Network-Aware Resource Allocation in Distributed Clouds Dissertation Research Summary Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering E-mail: aralat@itu.edu.tr April 4, 2016 Short Bio Research and

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Modeling and Optimization of Resource Allocation in Cloud

Modeling and Optimization of Resource Allocation in Cloud PhD Thesis Progress First Report Thesis Advisor: Asst. Prof. Dr. Tolga Ovatman Istanbul Technical University Department of Computer Engineering January 8, 2015 Outline 1 Introduction 2 Studies Time Plan

More information

Chapter 5. Minimization of Average Completion Time and Waiting Time in Cloud Computing Environment

Chapter 5. Minimization of Average Completion Time and Waiting Time in Cloud Computing Environment Chapter 5 Minimization of Average Completion Time and Waiting Time in Cloud Computing Cloud computing is the use of the Internet for the tasks the users performing on their computer. Cloud computing, also

More information

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 National Conference on Advanced Research Trends in Information and Computing Technologies (NCARTICT-2018), Department of IT,

More information

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud

A Comparative Study of Various Computing Environments-Cluster, Grid and Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1065

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Efficient Task Scheduling Algorithms for Cloud Computing Environment

Efficient Task Scheduling Algorithms for Cloud Computing Environment Efficient Task Scheduling Algorithms for Cloud Computing Environment S. Sindhu 1 and Saswati Mukherjee 2 1 Research Scholar, Department of Information Science and Technology sindhu.nss@gmail.com 2 Professor

More information

A Process Scheduling Algorithm Based on Threshold for the Cloud Computing Environment

A Process Scheduling Algorithm Based on Threshold for the Cloud Computing Environment Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

WHITE PAPER. LTE in Mining. Will it provide the predictability, capacity and speed you need for your mine?

WHITE PAPER. LTE in Mining. Will it provide the predictability, capacity and speed you need for your mine? WHITE PAPER LTE in Mining Will it provide the predictability, capacity and speed you need for your mine? Table of Contents I. Executive Overview 3 II. Methods of LTE Deployment Today 4 III. Availability

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Energy-Efficient Cluster Formation Techniques: A Survey

Energy-Efficient Cluster Formation Techniques: A Survey Energy-Efficient Cluster Formation Techniques: A Survey Jigisha Patel 1, Achyut Sakadasariya 2 P.G. Student, Dept. of Computer Engineering, C.G.P.I.T, Uka Tarasadia University, Bardoli, Gujarat, India

More information

An Efficient Architecture for Resource Provisioning in Fog Computing

An Efficient Architecture for Resource Provisioning in Fog Computing An Efficient Architecture for Resource Provisioning in Fog Computing Prof. Minaz Mulla 1, Malanbi Satabache 2, Netravati Purohit 3 1 Dept of Computer Science & Engineering, Secab Institute of Engineering

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo

A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo A Study on Load Balancing in Cloud Computing * Parveen Kumar,* Er.Mandeep Kaur Guru kashi University, Talwandi Sabo Abstract: Load Balancing is a computer networking method to distribute workload across

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Real-Time Internet of Things

Real-Time Internet of Things Real-Time Internet of Things Chenyang Lu Cyber-Physical Systems Laboratory h7p://www.cse.wustl.edu/~lu/ Internet of Things Ø Convergence of q Miniaturized devices: integrate processor, sensors and radios.

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1 Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 How Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies DSL Cable modems

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes

A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Balancing Algorithm in Wireless Sensor Network Based on the Assistance of Approaching Nodes 1,* Chengpei Tang, 1 Jiao Yin, 1 Yu Dong 1

More information

An Energy Efficient Intrusion Detection System in MANET.

An Energy Efficient Intrusion Detection System in MANET. An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of

More information

THE Internet was designed with the end-to-end principle

THE Internet was designed with the end-to-end principle 1146 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 4, APRIL 2016 PacketCloud: A Cloudlet-Based Open Platform for In-Network Services Yang Chen, Senior Member, IEEE, Yu Chen, Qiang

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Table of Contents Introduction... 3 Topology Awareness in Hadoop... 3 Virtual Hadoop... 4 HVE Solution... 5 Architecture...

More information

Condusiv s V-locity VM Accelerates Exchange 2010 over 60% on Virtual Machines without Additional Hardware

Condusiv s V-locity VM Accelerates Exchange 2010 over 60% on Virtual Machines without Additional Hardware openbench Labs Executive Briefing: March 13, 2013 Condusiv s V-locity VM Accelerates Exchange 2010 over 60% on Virtual Machines without Additional Hardware Optimizing I/O for Increased Throughput and Reduced

More information

Demand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation

Demand-adaptive VNF placement and scheduling in optical datacenter networks. Speaker: Tao Gao 8/10/2018 Group Meeting Presentation Demand-adaptive VNF placement and scheduling in optical datacenter networks Speaker: Tao Gao 8/10/2018 Group Meeting Presentation Background High CAPEX and OPEX when deploying and updating network infrastructure,

More information

VMware vshield Edge Design Guide

VMware vshield Edge Design Guide ware Technical WHITE PAPER ware Overview The new virtual datacenter (vdc) infrastructure deployments enable IT to provide on-demand infrastructure services to its customers on a common, shared infrastructure

More information

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology

APPLICATION NOTE. XCellAir s Wi-Fi Radio Resource Optimization Solution. Features, Test Results & Methodology APPLICATION NOTE XCellAir s Wi-Fi Radio Resource Optimization Solution Features, Test Results & Methodology Introduction Multi Service Operators (MSOs) and Internet service providers have been aggressively

More information

Never Drop a Call With TecInfo SIP Proxy White Paper

Never Drop a Call With TecInfo SIP Proxy White Paper Innovative Solutions. Trusted Performance. Intelligently Engineered. Never Drop a Call With TecInfo SIP Proxy White Paper TecInfo SD-WAN product - PowerLink - enables real time traffic like VoIP, video

More information

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization

Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization Traffic Signal Control Based On Fuzzy Artificial Neural Networks With Particle Swarm Optimization J.Venkatesh 1, B.Chiranjeevulu 2 1 PG Student, Dept. of ECE, Viswanadha Institute of Technology And Management,

More information

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL

TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Intranets and Virtual Private Networks (VPNs)

Intranets and Virtual Private Networks (VPNs) Intranets and Virtual Private Networks (VPNs) Definition Private networking involves securely transmitting corporate data across multiple sites throughout an entire enterprise. Creating a truly private

More information

The Desired State. Solving the Data Center s N-Dimensional Challenge

The Desired State. Solving the Data Center s N-Dimensional Challenge The Desired State Solving the Data Center s N-Dimensional Challenge Executive Summary To solve this fundamental problem in the softwaredefined age how to assure application performance while utilizing

More information

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA

Workshop on the IPv6 development in Saudi Arabia 8 February 2009; Riyadh - KSA Transition to IPv6 Drivers and Challenges Dr. Abdelfattah ABUQAYYAS ICT Consultant CITC- KSA 1 MAIN POINTS The ICT sector is developing rapidly - new services, and new modes of service delivery. The Internet

More information

OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS

OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS Ali Bagherinia 1 1 Department of Computer Engineering, Islamic Azad University-Dehdasht Branch, Dehdasht, Iran ali.bagherinia@gmail.com ABSTRACT In this paper

More information

TROPIC: Transactional Resource Orchestration Platform In the Cloud

TROPIC: Transactional Resource Orchestration Platform In the Cloud TROPIC: Transactional Resource Orchestration Platform In the Cloud Changbin Liu, Yun Mao*, Xu Chen*, Mary Fernandez*, Boon Thau Loo, Jacobus Van der Merwe* * netdb.cis.upenn.edu/dmf 1 Motivation Infrastructure

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization

Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,

More information

Smart Organization. Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India

Smart Organization. Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India 2017 IEEE 7th International Advance Computing Conference Smart Organization Vivek Ghule Department of Computer Engineering Vishwakarma Institute of Information Technology Pune, India vivekgghule@gmail.com

More information

Consolidating Complementary VMs with Spatial/Temporalawareness

Consolidating Complementary VMs with Spatial/Temporalawareness Consolidating Complementary VMs with Spatial/Temporalawareness in Cloud Datacenters Liuhua Chen and Haiying Shen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Introduction

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

Computing Environments

Computing Environments Brokering Techniques for Managing ThreeTier Applications in Distributed Cloud Computing Environments Nikolay Grozev Supervisor: Prof. Rajkumar Buyya 7th October 2015 PhD Completion Seminar 1 2 3 Cloud

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G

When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G When ICN Meets C-RAN for HetNets: An SDN Approach C H E N C H E N Y A N G, Z H I Y O N G C H E N, B I N X I A, A N D J I A N G Z H O U W A N G Motivation Mobile Internet and explosion of its applications,

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

Nowadays data-intensive applications play a

Nowadays data-intensive applications play a Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Falling Out of the Clouds: When Your Big Data Needs a New Home

Falling Out of the Clouds: When Your Big Data Needs a New Home Falling Out of the Clouds: When Your Big Data Needs a New Home Executive Summary Today s public cloud computing infrastructures are not architected to support truly large Big Data applications. While it

More information

Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center

Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center , pp.350-355 http://dx.doi.org/10.14257/astl.2013.29.74 Traffic-aware Virtual Machine Placement without Power Consumption Increment in Cloud Data Center Hieu Trong Vu 1,2, Soonwook Hwang 1* 1 National

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

DriveScale-DellEMC Reference Architecture

DriveScale-DellEMC Reference Architecture DriveScale-DellEMC Reference Architecture DellEMC/DRIVESCALE Introduction DriveScale has pioneered the concept of Software Composable Infrastructure that is designed to radically change the way data center

More information

ClearCube White Paper Best Practices Pairing Virtualization and Collaboration

ClearCube White Paper Best Practices Pairing Virtualization and Collaboration ClearCube White Paper Best Practices Pairing Virtualization and Collaboration Increasing VDI Audio/Video Performance for the Defense Connect Online User Community Introduction In Quarter 4, 2011, significant

More information

A Survey on CloudSim Toolkit for Implementing Cloud Infrastructure

A Survey on CloudSim Toolkit for Implementing Cloud Infrastructure IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 12 June 2015 ISSN (online): 2349-784X A Survey on CloudSim Toolkit for Implementing Cloud Infrastructure Harsha Amipara

More information

How Microsoft IT Reduced Operating Expenses Using Virtualization

How Microsoft IT Reduced Operating Expenses Using Virtualization How Microsoft IT Reduced Operating Expenses Using Virtualization Published: May 2010 The following content may no longer reflect Microsoft s current position or infrastructure. This content should be viewed

More information

Network+ Guide to Networks 6 th Edition

Network+ Guide to Networks 6 th Edition Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure

More information

Zentera Systems CoIP Platform

Zentera Systems CoIP Platform Application Note Zentera Systems CoIP Platform Traffic Isolation Using CoIP Traffic Isolation is Critical to Network Security An important attribute of any network is that it ensures certain types of traffic

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Workload Aware Load Balancing For Cloud Data Center

Workload Aware Load Balancing For Cloud Data Center Workload Aware Load Balancing For Cloud Data Center SrividhyaR 1, Uma Maheswari K 2 and Rajkumar Rajavel 3 1,2,3 Associate Professor-IT, B-Tech- Information Technology, KCG college of Technology Abstract

More information

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India

Associate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Scheduling

More information

How can we gain the insights and control we need to optimize the performance of applications running on our network?

How can we gain the insights and control we need to optimize the performance of applications running on our network? SOLUTION BRIEF CA Network Flow Analysis and Cisco Application Visibility and Control How can we gain the insights and control we need to optimize the performance of applications running on our network?

More information

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m

More information

Department of Information Technology Sri Venkateshwara College of Engineering, Chennai, India. 1 2

Department of Information Technology Sri Venkateshwara College of Engineering, Chennai, India. 1 2 Energy-Aware Scheduling Using Workload Consolidation Techniques in Cloud Environment 1 Sridharshini V, 2 V.M.Sivagami 1 PG Scholar, 2 Associate Professor Department of Information Technology Sri Venkateshwara

More information

C3PO: Computation Congestion Control (PrOactive)

C3PO: Computation Congestion Control (PrOactive) C3PO: Computation Congestion Control (PrOactive) an algorithm for dynamic diffusion of ephemeral in-network services Liang Wang, Mario Almeida*, Jeremy Blackburn*, Jon Crowcroft University of Cambridge,

More information

Composable Infrastructure for Public Cloud Service Providers

Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure for Public Cloud Service Providers Composable Infrastructure Delivers a Cost Effective, High Performance Platform for Big Data in the Cloud How can a public cloud provider offer

More information

Centralization of Network using Openflow Protocol

Centralization of Network using Openflow Protocol Indian Journal of Science and Technology, Vol 8(S2), 165 170, January 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS2/61217 Centralization of Network using Openflow

More information

Distributed Systems Architectures. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1

Distributed Systems Architectures. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1 Distributed Systems Architectures Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 12 Slide 1 Objectives To explain the advantages and disadvantages of different distributed systems architectures

More information

Multi-Criteria Strategy for Job Scheduling and Resource Load Balancing in Cloud Computing Environment

Multi-Criteria Strategy for Job Scheduling and Resource Load Balancing in Cloud Computing Environment Indian Journal of Science and Technology, Vol 8(30), DOI: 0.7485/ijst/205/v8i30/85923, November 205 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multi-Criteria Strategy for Job Scheduling and Resource

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform

Creating the Future on the Shoulders of a Giant ZTE Flagship Tbit Optical Platform Creating the Future on the Shoulders of a Giant ------ZTE Flagship Tbit Optical Platform Led by the rapid development of emerging services including HD (high definition) video, VR (virtual reality) and

More information

Hybrid of Ant Colony Optimization and Gravitational Emulation Based Load Balancing Strategy in Cloud Computing

Hybrid of Ant Colony Optimization and Gravitational Emulation Based Load Balancing Strategy in Cloud Computing Hybrid of Ant Colony Optimization and Gravitational Emulation Based Load Balancing Strategy in Cloud Computing Jyoti Yadav 1, Dr. Sanjay Tyagi 2 1M.Tech. Scholar, Department of Computer Science & Applications,

More information

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 10.1 A real SDN implementation: the Google B4 case. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 10.1 A real SDN implementation: the Google B4 case Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it WAN WAN = Wide Area Network WAN features: Very expensive (specialized high-end

More information