SlideShare a Scribd company logo
1 of 6
PERFORMANCE ANALYSIS OF CLOUD COMPUTING
       AND COST ESTIMATION USING COCOMO II TECHNIQUE


OBJECTIVE:


       The main objective of this project is to evaluate the performance analysis of
cloud computing centers using queuing systems. To obtain accurate estimation of
the complete probability distribution of the request response time and other
important performance indicators such as mean number of tasks in the system,
blocking probability, and probability.


PROBLEM DIFINITION:


           A cloud center can have a large number of facility (server) nodes,
             typically of the order of hundreds or thousands, traditional queuing
             analysis rarely considers systems of this size.
           The coefficient of variation of task service time may be high.
           Due to the dynamic nature of cloud environments, diversity of user’s
             requests and time dependency of load, cloud centers must provide
             expected quality of service at widely varying loads.


ABSTRACT:


      Cloud Computing is a novel paradigm for the provision of computing
infrastructure, which aims to shift the location of the computing infrastructure to

                               Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
the network in order to reduce the costs of management and maintenance of
hardware and software resources. Cloud computing has a service-oriented
architecture in which services are broadly divided into three categories:
Infrastructure-as-a- Service (IaaS), which includes equipment such as hardware,
Storage, servers, and networking components are made accessible over the
Internet; Platform-as-a-Service (PaaS), which includes hardware and software
computing platforms such as virtualized servers, operating systems, and the like;
and Software-as-a-Service (SaaS), which includes software applications and other
hosted services.


      To obtain accurate estimation of the complete probability distribution of the
request response time and other important performance indicators. The model
allows cloud operators to determine the relationship between the number of servers
and input buffer size, on one side, and the performance indicators such as mean
number of tasks in the system, blocking probability, and probability that a task will
obtain immediate service, on the other.


EXISTING SYSTEM:


          The number of servers is comparatively small, typically below 10,
             which makes them unsuitable for performance analysis of cloud
             computing data centers.
          Approximations are very sensitive to the probability distribution of
             task service times.



                               Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
 User may submit many tasks at a time because of this bags-of-task
             will appear.


DISADVANTAGES:


          Due to dynamic nature of cloud environments, diversity of user’s
             requests and time dependency of load is high.
          Traffic intensity is high.
          The coefficient of variation of task service time is high.
          Modeling errors.


PROPOSED SYSTEM:


      In Proposed system, the task is sent to the cloud center is serviced within a
suitable facility node; upon finishing the service, the task leaves the center. A
facility node may contain different computing resources such as web servers,
database servers, directory servers, and others. A service level agreement, SLA,
outlines all aspects of cloud service usage and the obligations of both service
providers and clients, including various descriptors collectively referred to as
Quality of Service (QoS). QoS includes availability, throughput, reliability,
security, and many other parameters, but also performance indicators such as
response time, task blocking probability, probability of immediate service, and
mean number of tasks in the system, all of which may be determined using the
tools of queuing theory.



                               Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
We model a cloud server farm as a COCOMO II system which indicates that
the inter arrival time of requestsis exponentially distributed, while task service
times are independent and identically distributed random variables that follow a
general distribution with mean value of u. The system under consideration contains
m servers which render service in order of task request arrivals (FCFS).The
capacity of system is m þ r which means the buffer size for incoming request is
equal to r. As the population size of a typical cloud center is relatively high while
the probability that a given user will request service is relatively small, the arrival
process can be modeled as a Markovian process.


ADVANTAGES:


           Less Traffic Intensity.
           Analytical technique based on an approximate Markov chain model
             for best performance evaluation.
           General Service time for requests and large number of servers makes
             our model flexible in terms of scalability and diversity of service time.
           High degree of accuracy for the mean number of tasks in the system,
             blocking probability, probability, response time.




ALGORITHM USED:


      1. COCOMO-II
      2. A-Priori Algorithm

                                Z Technologies
                      www.ztech.ininfo@ztech.incall : 91760 91765
3. AES (Advanced Encryption Standard)




ARCHITECTURE DIAGRAM:


                Cloud Server                                                  User
                                          H
               Coordinator

                                                   Internet


     CS1          CS2               CSn




                                                                Back-end Database
               Shared File system




SYSTEM REQUIREMENTS:

 Hardware Requirements:

           •   Intel Pentium IV
           •   256/512 MB RAM
           •   1 GB Free disk space or greater
                               Z Technologies
                  www.ztech.ininfo@ztech.incall : 91760 91765
•     1 GB on Boot Drive
           •     17” XVGA display monitor
           •     1 Network Interface Card (NIC)
Software Requirements:

           •     MS Windows XP/ windows 7
           •     MS IE Browser 6.0/later
           •     MS Dot Net Framework 4.0
           •     MS Visual Studio.Net 2010
           •     Internet Information Server (IIS)
           •     MS SQL Server 2005
           •     Windows Installer 3.1



APPLICATIONS:

        1. Organizations
        2. Cloud Providers Clients
        3. Government Sectores




                            Z Technologies
                   www.ztech.ininfo@ztech.incall : 91760 91765

More Related Content

More from ZTech Proje

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageZTech Proje
 
message passing interface
message passing interfacemessage passing interface
message passing interfaceZTech Proje
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingZTech Proje
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyZTech Proje
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...ZTech Proje
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingZTech Proje
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartZTech Proje
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...ZTech Proje
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualZTech Proje
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyZTech Proje
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualZTech Proje
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...ZTech Proje
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...ZTech Proje
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...ZTech Proje
 

More from ZTech Proje (20)

separable reversible data hiding in encrypted image
separable reversible data hiding in encrypted imageseparable reversible data hiding in encrypted image
separable reversible data hiding in encrypted image
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganographyPsdot 17 new channel selection rule for jpeg steganography
Psdot 17 new channel selection rule for jpeg steganography
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
Psdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heartPsdot 14 using data mining techniques in heart
Psdot 14 using data mining techniques in heart
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system usingPsdot 10 real time smart car lock security system using
Psdot 10 real time smart car lock security system using
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
Psdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancyPsdot 23 airport reasoning about time-dependent parking lot occupancy
Psdot 23 airport reasoning about time-dependent parking lot occupancy
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 

Psdot 15 performance analysis of cloud computing

  • 1. PERFORMANCE ANALYSIS OF CLOUD COMPUTING AND COST ESTIMATION USING COCOMO II TECHNIQUE OBJECTIVE: The main objective of this project is to evaluate the performance analysis of cloud computing centers using queuing systems. To obtain accurate estimation of the complete probability distribution of the request response time and other important performance indicators such as mean number of tasks in the system, blocking probability, and probability. PROBLEM DIFINITION:  A cloud center can have a large number of facility (server) nodes, typically of the order of hundreds or thousands, traditional queuing analysis rarely considers systems of this size.  The coefficient of variation of task service time may be high.  Due to the dynamic nature of cloud environments, diversity of user’s requests and time dependency of load, cloud centers must provide expected quality of service at widely varying loads. ABSTRACT: Cloud Computing is a novel paradigm for the provision of computing infrastructure, which aims to shift the location of the computing infrastructure to Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 2. the network in order to reduce the costs of management and maintenance of hardware and software resources. Cloud computing has a service-oriented architecture in which services are broadly divided into three categories: Infrastructure-as-a- Service (IaaS), which includes equipment such as hardware, Storage, servers, and networking components are made accessible over the Internet; Platform-as-a-Service (PaaS), which includes hardware and software computing platforms such as virtualized servers, operating systems, and the like; and Software-as-a-Service (SaaS), which includes software applications and other hosted services. To obtain accurate estimation of the complete probability distribution of the request response time and other important performance indicators. The model allows cloud operators to determine the relationship between the number of servers and input buffer size, on one side, and the performance indicators such as mean number of tasks in the system, blocking probability, and probability that a task will obtain immediate service, on the other. EXISTING SYSTEM:  The number of servers is comparatively small, typically below 10, which makes them unsuitable for performance analysis of cloud computing data centers.  Approximations are very sensitive to the probability distribution of task service times. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 3.  User may submit many tasks at a time because of this bags-of-task will appear. DISADVANTAGES:  Due to dynamic nature of cloud environments, diversity of user’s requests and time dependency of load is high.  Traffic intensity is high.  The coefficient of variation of task service time is high.  Modeling errors. PROPOSED SYSTEM: In Proposed system, the task is sent to the cloud center is serviced within a suitable facility node; upon finishing the service, the task leaves the center. A facility node may contain different computing resources such as web servers, database servers, directory servers, and others. A service level agreement, SLA, outlines all aspects of cloud service usage and the obligations of both service providers and clients, including various descriptors collectively referred to as Quality of Service (QoS). QoS includes availability, throughput, reliability, security, and many other parameters, but also performance indicators such as response time, task blocking probability, probability of immediate service, and mean number of tasks in the system, all of which may be determined using the tools of queuing theory. Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 4. We model a cloud server farm as a COCOMO II system which indicates that the inter arrival time of requestsis exponentially distributed, while task service times are independent and identically distributed random variables that follow a general distribution with mean value of u. The system under consideration contains m servers which render service in order of task request arrivals (FCFS).The capacity of system is m þ r which means the buffer size for incoming request is equal to r. As the population size of a typical cloud center is relatively high while the probability that a given user will request service is relatively small, the arrival process can be modeled as a Markovian process. ADVANTAGES:  Less Traffic Intensity.  Analytical technique based on an approximate Markov chain model for best performance evaluation.  General Service time for requests and large number of servers makes our model flexible in terms of scalability and diversity of service time.  High degree of accuracy for the mean number of tasks in the system, blocking probability, probability, response time. ALGORITHM USED: 1. COCOMO-II 2. A-Priori Algorithm Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 5. 3. AES (Advanced Encryption Standard) ARCHITECTURE DIAGRAM: Cloud Server User H Coordinator Internet CS1 CS2 CSn Back-end Database Shared File system SYSTEM REQUIREMENTS: Hardware Requirements: • Intel Pentium IV • 256/512 MB RAM • 1 GB Free disk space or greater Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765
  • 6. 1 GB on Boot Drive • 17” XVGA display monitor • 1 Network Interface Card (NIC) Software Requirements: • MS Windows XP/ windows 7 • MS IE Browser 6.0/later • MS Dot Net Framework 4.0 • MS Visual Studio.Net 2010 • Internet Information Server (IIS) • MS SQL Server 2005 • Windows Installer 3.1 APPLICATIONS: 1. Organizations 2. Cloud Providers Clients 3. Government Sectores Z Technologies www.ztech.ininfo@ztech.incall : 91760 91765