SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                           Volume 1, Issue 5, July 2012


         Improvising the Infrastructure as a Service Cloud
                     A. Vamsi Krishna                                                   Prof C. Rajendra,
          M. Tech Student, Department of CSE,                                     Head, Department of CSE,
    Audisankara College of Engineering & Technology,                   Audisankara College of Engineering & Technology,
              Gudur, Andhrapradesh, India,                                       Gudur, Andhrapradesh, India,
               avamsi.mtech@gmail.com

Abstract—         The       main       benefit       of     IaaS   computing. This condition is mostly rigid to recognize in the
(Infrastructure-as-a-Service clouds) is facilitate the users to    world of systematic computing where the use of batch
retrieve their resources on demand. But, to afford on-demand       schedulers classically ensures high exploitation and thus
access, cloud centers must either drastically abundance their      much better resource paying off. Thus, latent low
infrastructure (and pay a high price for operating resources       exploitation constitutes a momentous impending problem to
with low utilization) or reject a large proportion of user
                                                                   the espousal of cloud computing in the systematic world.
requests (in which case the access is no longer on-demand).
Several models, applications and workflows are implemented            At the similar instance, while the on-demand capabilities
for recovering the resources where interruptions in service are    of IaaS clouds are supreme for many scientific use cases,
predictable. For instance, many researchers and scientists         there are others that do not essentially need on-demand
utilize HTC (High Throughput Computing) enabled resources,         access to resources. Several systems, specifically volunteer
such as Condor, where jobs are dispatched to available             computing systems such as SETI@Home and
resources and terminated when the resource is no longer            Folding@Home, are capable of taking advantage of
available.                                                         resources available opportunistically and are also
   AS a solution we propose a special infrastructure for the       perceptible, i.e., intended as breakdown supple systems
cloud centers that overlaps on-demand allocation of resources
                                                                   where interruptions in service can be handled without
with opportunistic provisioning of cycles from inactive cloud
nodes to other processes by installing backfill Virtual Machines   compromising the integrity of computation. One pattern in
(VMs). For manifestation and tentative evaluation, we extend       the scientific community is the use of HTC (high throughput
the Nimbus cloud computing toolkit to deploy backfill VMs on       computing), as developed by e.g., the Condor system where
idle cloud nodes for dispensation an HTC workload. We exhibit      users occupy HTC [1] enabled resources to route their
that a mutual infrastructure amid IaaS cloud providers and an      workloads. These applications are intended to “forage”
HTC job supervision system can be highly beneficial to both the    unused resource cycles: for example, when a user stops using
IaaS cloud provider and HTC users by increasing the                their desktop, the screensaver might use the resource to run a
consumption of the cloud infrastructure and contributing cycles    volunteer computing program. The job may then be pre-empt
that would otherwise be idle to processing HTC jobs.
                                                                   when the resource becomes engaged i.e., the user is using it
                                                                   again, in which case the job is typically requeued and
Keywords: IaaS, improving cloud infrastructure.
                                                                   rescheduled on another available resource by the HTC
                                                                   system that manages it.
                      I.   INTRODUCTION
    Infrastructure-as-a-Service (IaaS) cloud computing has
emerged as an striking substitute to the attainment and
management of physical resources. The on-demand
provisioning it ropes allows users to elastically enlarge and
pact the reserve base available to them based on an
immediate require - a pattern that enables a quick turnaround
time when dealing with emergencies, working towards
deadlines, or growing an institutional resource base. This
pattern makes it expedient for institutions to configure
private clouds that allow their users a seamless or near
seamless transition to community or commercial clouds
supporting compatible VM images and cloud interfaces.
Such private clouds are characteristically configured with
open source IaaS implementations such as Nimbus or
Eucalyptus.
   Nonetheless, such private cloud deployment also faces a
exploitation trouble. In order to guarantee on-demand
                                                                               Figure 1 Backfill Virtual Machine example
accessibility a provider needs to abundance: keep a large part
of nodes idle so that they can be used to gratify an on-demand
                                                                       In this paper we proposing a infrastructure cloud that
request, which could come at any time. The need to remain all
                                                                   merges on-demand allowance of assets with opportunistic
these nodes inoperative leads to short exploitation. The only
                                                                   provisioning of cycles from idle cloud nodes to other
way to improve it is to keep fewer nodes idle. However this
                                                                   processes, such as by installing backfill VMs. Backfill VMs
means potentially avoiding a higher proportion of desires to a
                                                                   are installed on inactive cloud nodes and can be configured to
point at which a provider does not provides on-demand

                                                                                                                             367
                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 5, July 2012

execute any preferred role. A VM is concluded while the             A. Architecture
resource is desired to gratify an on-demand request. If we           The figure 1 illustrates the infrastructure of service cloud;
make certain that the computation happening in backfill VMs       in this instance the client submits 3 individual tasks to the
is pliant to such sudden extinction, the time that would          Condor master, which is able to schedule 1 task immediately
otherwise be idle can be valuably tired. Overall, [7] these       on a local worker. But, because the left over resources in site
propose achieves two goals: for cloud providers, it offers a      B’s Condor pool are hectic, Condor leverages the cycles
path to advanced utilized clouds; for cloud users, it offers      provided by site A’s backfill VMs to launch the other 2 tasks
another type of reserve lease, potentially cheaper than           without delay. Condor is a superlative entrant for such a
on-demand, nonpreemptible resource.                               operation because of its original plan as a cycle-scavenger
   In our proposal we widen the Nimbus toolkit to install         where inactive desktop systems execute jobs until the
backfill VMs on idle Virtual Machine Monitor (VMM)                system’s user returns, after which the job is either migrated to
nodes. There are so many open source toolkits are available,      another system or prematurely terminated and re-launched on
Nimbus is also a open source toolkit for deploying IaaS           another system. Condor [3] is a superlative entrant for such a
clouds, planned with extensibility in mind, which makes it        operation because of its original plan as a cycle-scavenger
mainly appropriate for projects such as the one described         where inactive desktop systems execute jobs until the
here. To exemplify our system behavior, we shape the              system’s user returns, after which the job is either migrated to
backfill VMs as Condor workers that integrate with a Condor       another system or prematurely terminated and re-launched on
pool to process jobs. We appraise the capability of the system    another system. Backfill exploitation could be much more
to augment exploitation of the IaaS cloud infrastructure          composite then the example depicted in Figure 1.
without sacrificing the capacity of the IaaS cloud to provision       Cloud administrators of IaaS should consider a diversity
resources on-demand. We find that throughout certain              of different backfill configurations while installing a backfill
portions of our trial assessment backfill VMs contribute to an    resolution on an IaaS cloud. The configuration is prejudiced
increase in the utilization of the IaaS cloud infrastructure      by the uniqueness of the original physical IaaS resources, the
from 38.5% to 100% with only 6.39% overhead cost for              users of on-demand leases, and the users of preemptible
processing the workload.                                          leases.
                                                                      First, suitable backfill functions and flow of works must
                       II.   APPROACH                             be identified. These functions must contain the constraints
    A total infrastructure cloud operates by allowing a user to   discussed earlier, namely, they must be proficient to employ a
make leases against its group of resources; an infrastructure     changeable number of nodes that may join or leave the
lease makes a resource accessible to the user based on set of     system at any time. Second, install a single VM for each core
lease stipulations defining the accessibility, capability and     on the virtual machine monitor (VMM) node, Third, the IaaS
universal circumstances of a lease. In our system we focus on     cloud administrator have to resolve the inexact volume of the
investigating two types of leases:                                backfill deployment, relative to the volume of the IaaS cloud.
  On-demand, non-preemptible and stretchy leases grant a         Finally, the IaaS cloud administrator has to resolve the
      user admission to a resource within interactive time of     backfill VM image installation method.
      assembly the request and make the resource accessible         B. Backfill termination policies
      for an agreed-upon period of time. The user can deploy
      any VM attuned with the system.                                 Backfill VMs are installed on inactive VMM nodes and
                                                                  terminated whenever space is needed to service an
  Opportunistic, preemptible and pre-set leases grant a user
                                                                  on-demand lease. But, the precise backfill VMs that are
      admission to a resource at an indefinite time and make
                                                                  selected for termination might collision the services,
      the resource accessible to the user for an indefinite
                                                                  applications, or workflows executing inside those VMs. For
      amount of time. Further, this resource is pre-defined for
                                                                  this rationale, preferably the backfill VM termination policies
      the user by the cloud manager, i.e. the user cannot
                                                                  should consider the applications and services running inside
      provide his or her own VM.
                                                                  those VMs as well as general factors such as the need for
                                                                  clean shutdown, the ability of an application to
   In the circumstance of IaaS clouds, backfill VMs are
                                                                  checkpoint/restart, etc. We are using two simple policies that
broad VMs deployed on IaaS resources using a preemptible
                                                                  do not integrate such hints and highlight their shortcomings.
lease that may be configured to execute any function.
                                                                        Random selection of VMs to terminate.
   The VMs have two main constraints, in the on-demand
                                                                        Selecting least running VMs.
lease backfill VMs could be concluded abruptly to free up
space for the IaaS cloud administrator, another one is,
                                                                                      III.   IMPLIMENTATION
because of the erratic timing of on-demand leases, a
changeable amount of backfill VMs may be accessible at any           We broaden the open source Nimbus cloud computing
given time. So, we suppose that applications executing within     toolkit, which facilitates on-demand entrée to resources, to
backfill VMs are planned to knob environments that contain        support the exploitation of preemptible leases on inactive
a changeable amount of employees that may join or leave the       cloud nodes, also referred to as backfill. We make a variety of
system at any time.                                               simplifying assumptions in our present realization. First, the
    Some applications are not well-matched for these volatile     cloud administrators have to organize VMs. Second, the
environments, for example, analogous applications that            present realization is proficient of using just a single backfill
necessitate all processes to be nearby for the extent of the      VM image per VMM node. Diverse backfill VM metaphors
application’s execution and require checkpoint or restart         may possibly be installed on different VMM nodes, allowing
capabilities.

                                             All Rights Reserved © 2012 IJARCET
                                                                                                                              368
ISSN: 2278 – 1323
                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 5, July 2012

multiple backfill VM images to operate within the same IaaS           Unpaid assistant computing systems, such as BOINC [4],
cloud, each performing diverse functions.                             harvest cycles from idle systems distributed across the
    Unless the user specifies the max amount of backfill              Internet. These applications are planned to contain
instances, backfill involuntarily attempts to arrange as lots of      interruptions in service since broadly distributed computers,
backfill VMs as probable when it is enabled. Primarily, we            operated by an ostensibly countless number of unrelated
hold two annihilation policies for selecting backfill VMs for         users, cannot provide any promise of service.
termination in order to fulfill an on-demand lease.                       In the case of unpaid assistant computing systems
    Finally, our backfill achievement austerely terminates the        interruption in service are typically the results of users
backfill VM. Sparkling termination [6] requires extra                 habitual to their systems to do work, systems crashing, or
instance over trashing the VM, even though, performing a              systems becoming disconnected from the Internet.
clean termination notifies services and applications running          Applications that control unpaid assistant computing systems
inside the backfill VM that the VM will be terminated,                would be ideal candidates for backfill VMs because of their
allowing them to respond appropriately.                               ability to handle unforeseen failures in service.
                                                                          In [2] we also influence recuperation techniques,
Backfill arrangement options
                                                                      expressly pausing and resuming VMs, to achieve high
   The administrator of the cloud can merely organize the             utilization of clloud infrastructures. While the craving of
Backfill. The backfill.conf consists of the option which              maintaining high utilization via introducing unlike types of
allows the admin to organize the backfill VMs easily. The             leases is the equivalent as the work described here, the leases
backfill.conf options include backfill disabled, max                  themselves as well as the recuperation practice used,
instances, disk image, duration seconds, termination policy,          specifically that of suspending and resuming VMs is different
retry period, network.                                                from the focus in our work. as an alternative of using
    As piece of our modifications to the Nimbus terminal              suspend/resume to support advanced worries we leverage a
service, we also customized its scheduler to notice several           recuperation system that uses resubmission (Condor) to
discarded desires for on-demand user VMs. If we perceive an           ensure that high utilization is achieved and no work is lost.
unwanted on-demand user command and backfill is enabled,                  Amazon is an added area that shares associated themes to
we endeavor to terminate the proper amount of backfill VMs            our job is smudge pricing, as exemplified by. With spot
so that the user appeal can be fulfilled [5].                         pricing users place bids for instances and the cloud provider
    We endeavor to service the user requests once more after          sporadically adjusts the price of smudge instances,
the backfill VMs are terminated. If the user appeals are not          terminating the smudge instances with bids that fall below the
processed, we prolong terminating backfill VMs up to we               new spot price and launching instances that meet or exceed
are able to process the user requests and all backfill VMs are        the spot price. Our effort uses the current demand for
terminated. The user request is eliminated if all the VMs are         on-demand user VMs to determine the accessibility for
terminated and still helpless to service the use request. We          backfill VMs while Amazon bases availability of spot
also adapted the scheduler to perceive when on-demand users           instances on a smudge price.
are terminating VMs.
                                                                                            V.   CONCLUSIONS
                     IV. RELATED WORK
                                                                          The main benefit of IaaS (Infrastructure-as-a-Service
  Infrastructure as a Service is a provision model in which an        clouds) is facilitating the users to retrieve their resources on
organization outsources the equipment used to support                 demand. But, to afford on-demand access, cloud centers must
operations, including storage, hardware, servers and                  either drastically abundance their infrastructure (and pay a
networking components. The service provider owns the                  high price for operating resources with low utilization) or
equipment and is responsible for housing, running and                 reject a large proportion of user requests (in which case the
maintaining it. The client typically pays on a per-use basis.         access is no longer on-demand). Several models, applications
   Cloud computing is all the rage. "It's become the phrase du        and workflows are implemented for recovering the resources
jour," says Gartner senior analyst Ben Pring, echoing many            where interruptions in service are predictable. For instance,
of his peers. The problem is that (as with Web 2.0) everyone          many researchers and scientists utilize HTC (High
seems to have a different definition.As a metaphor for the            Throughput Computing) enabled resources, such as Condor,
Internet, "the cloud" is a familiar cliché, but when combined         where jobs are dispatched to available resources and
with "computing," the meaning gets bigger and fuzzier. Some           terminated when the resource is no longer available.
analysts and vendors define cloud computing narrowly as an                AS a solution we proposed a special infrastructure for the
updated version of utility computing: basically available over        cloud centers that overlaps on-demand allocation of
the Internet. Others go very broad, arguing anything you              resources with opportunistic provisioning of cycles from
consume outside the firewall is "in the cloud," including             inactive cloud nodes to other processes by installing backfill
conventional outsourcing.                                             Virtual Machines (VMs). For manifestation and tentative
                                                                      evaluation, we extend the Nimbus cloud computing toolkit to
    Even if our effort utilizes backfill to attain high utilization   deploy backfill VMs on idle cloud nodes for dispensation an
of a cloud infrastructure, it is diverse from work that uses          HTC workload. We exhibit that a mutual infrastructure amid
backfill arrangement to augment the exploitation of large             IaaS cloud providers and an HTC job supervision system can
computers. Grounding on computers does not obviously                  be highly beneficial to both the IaaS cloud provider and HTC
presume that backfill tasks will be preempted by an                   users by increasing the consumption of the cloud
on-demand stipulate, looking for directly access the
resources, while our work assumes this to be the default case.
                                                                                                                                  369
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                           International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                Volume 1, Issue 5, July 2012

infrastructure and contributing cycles that would otherwise
be idle to processing HTC jobs.

                              REFERENCES
[1]   Nimbus 2.6 Backfill (prototype). GitHub. [Online]. Retreived
      December                 6,               2010,              from:
      ttps://github.com/pdmars/nimbus/tree/backfill-2.6
[2]   Nimbus.        [Online].   Retreived     December     6,     2010,
      from:http://www.nimbusproject.org/
[3]   Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff
      and Zagorodnov D. Eucalyptus opensource cloud-computing system.
      In CCA08: Cloud Computing and Its Applications, 2008.
[4]   Ren X, Lee S, Eigenmann R, and Bagchi S. “Resource Failure
      Prediction in Fine-Grained Cycle Sharing System,” HPDC ’06, 2006.
[5]   Ryu K and Hollingsworth J. "Unobtrusiveness and Efficiency in Idle
      Cycle Stealing for PC Grids," in Proceedings of IPDPS’04, 2004, p.
      62a.
[6]   Science Clouds. [Online]. Retreived December 6, 2010,
      from:http://www.scienceclouds.org/
[7]   Smith, JE. and Nair, R. Virtual machines: versatile platforms for
      systems and processes. Morgan Kaufmann Publishers, San Francisco,
      CA, USA, 2005.




                                                    All Rights Reserved © 2012 IJARCET
                                                                                                                        370

Contenu connexe

Tendances

Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemJoão Gabriel Lima
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud ImplementationMorphlabs
 
Understanding the Cloud Computing Stack
Understanding the Cloud Computing StackUnderstanding the Cloud Computing Stack
Understanding the Cloud Computing StackRackspace
 
Windows Azure and the cloud: What it’s all about
Windows Azure and the cloud: What it’s all aboutWindows Azure and the cloud: What it’s all about
Windows Azure and the cloud: What it’s all aboutMaarten Balliauw
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshareValencell, Inc.
 
Kybernetika accelerates provision of virtual IT environments
Kybernetika accelerates provision of virtual IT environmentsKybernetika accelerates provision of virtual IT environments
Kybernetika accelerates provision of virtual IT environmentsCisco Case Studies
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big ThingCloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big Thingg2ix
 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperNewton Day Uploads
 
Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go talemadi
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Guptavdmchallenge
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...idescitation
 

Tendances (20)

484 488
484 488484 488
484 488
 
Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop system
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Simplifying Cloud Implementation
Simplifying Cloud ImplementationSimplifying Cloud Implementation
Simplifying Cloud Implementation
 
Understanding the Cloud Computing Stack
Understanding the Cloud Computing StackUnderstanding the Cloud Computing Stack
Understanding the Cloud Computing Stack
 
Windows Azure and the cloud: What it’s all about
Windows Azure and the cloud: What it’s all aboutWindows Azure and the cloud: What it’s all about
Windows Azure and the cloud: What it’s all about
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Utility metered cloud slideshare
Utility metered cloud   slideshareUtility metered cloud   slideshare
Utility metered cloud slideshare
 
Kybernetika accelerates provision of virtual IT environments
Kybernetika accelerates provision of virtual IT environmentsKybernetika accelerates provision of virtual IT environments
Kybernetika accelerates provision of virtual IT environments
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big ThingCloud Computing Hype or Next Big Thing
Cloud Computing Hype or Next Big Thing
 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
 
Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta
#VirtualDesignMaster 3 Challenge 2 - Harshvardhan Gupta
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
666 670
666 670666 670
666 670
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
 

En vedette (14)

140 144
140 144140 144
140 144
 
Comparison+of+memetic+algorithm+and+pso+in+optimizing++multi+job+shop+schedul...
Comparison+of+memetic+algorithm+and+pso+in+optimizing++multi+job+shop+schedul...Comparison+of+memetic+algorithm+and+pso+in+optimizing++multi+job+shop+schedul...
Comparison+of+memetic+algorithm+and+pso+in+optimizing++multi+job+shop+schedul...
 
494 497
494 497494 497
494 497
 
352 356
352 356352 356
352 356
 
704 708
704 708704 708
704 708
 
341 345
341 345341 345
341 345
 
201 209
201 209201 209
201 209
 
251 255
251 255251 255
251 255
 
386 390
386 390386 390
386 390
 
341 346
341 346341 346
341 346
 
180 184
180 184180 184
180 184
 
303 306
303 306303 306
303 306
 
439 442
439 442439 442
439 442
 
Wireless sensor networks for disaster managment
Wireless sensor networks for disaster managmentWireless sensor networks for disaster managment
Wireless sensor networks for disaster managment
 

Similaire à Improving IaaS Cloud Infrastructure Utilization

Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudIJASCSE
 
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...AM Publications
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...IOSR Journals
 
Cloud computing Project from ganesh
Cloud computing Project  from ganeshCloud computing Project  from ganesh
Cloud computing Project from ganeshGanesh ReddyCse
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfPalanikumar72221
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxbudabrooks46239
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd Iaetsd
 
Extending Grids with Cloud Resource Management for Scientific Computing
Extending Grids with Cloud Resource Management for Scientific ComputingExtending Grids with Cloud Resource Management for Scientific Computing
Extending Grids with Cloud Resource Management for Scientific ComputingBharat Kalia
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
All About Cloud Computing by Callender Creates
All About Cloud Computing by Callender CreatesAll About Cloud Computing by Callender Creates
All About Cloud Computing by Callender CreatesNews UK
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computingMehul Patel
 

Similaire à Improving IaaS Cloud Infrastructure Utilization (20)

Improving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure CloudImproving Utilization of Infrastructure Cloud
Improving Utilization of Infrastructure Cloud
 
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
 
D017212027
D017212027D017212027
D017212027
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
 
Cloud computing Project from ganesh
Cloud computing Project  from ganeshCloud computing Project  from ganesh
Cloud computing Project from ganesh
 
Cloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdfCloud_on_Linux_Operating_System.pdf
Cloud_on_Linux_Operating_System.pdf
 
E42053035
E42053035E42053035
E42053035
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docxShort Economic EssayPlease answer MINIMUM 400 word I need this.docx
Short Economic EssayPlease answer MINIMUM 400 word I need this.docx
 
335 340
335 340335 340
335 340
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
119 125
119 125119 125
119 125
 
119 125
119 125119 125
119 125
 
Cloud1 Computing 01
Cloud1 Computing 01Cloud1 Computing 01
Cloud1 Computing 01
 
Presentation
PresentationPresentation
Presentation
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with cost
 
Extending Grids with Cloud Resource Management for Scientific Computing
Extending Grids with Cloud Resource Management for Scientific ComputingExtending Grids with Cloud Resource Management for Scientific Computing
Extending Grids with Cloud Resource Management for Scientific Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
All About Cloud Computing by Callender Creates
All About Cloud Computing by Callender CreatesAll About Cloud Computing by Callender Creates
All About Cloud Computing by Callender Creates
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Improving IaaS Cloud Infrastructure Utilization

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Improvising the Infrastructure as a Service Cloud A. Vamsi Krishna Prof C. Rajendra, M. Tech Student, Department of CSE, Head, Department of CSE, Audisankara College of Engineering & Technology, Audisankara College of Engineering & Technology, Gudur, Andhrapradesh, India, Gudur, Andhrapradesh, India, avamsi.mtech@gmail.com Abstract— The main benefit of IaaS computing. This condition is mostly rigid to recognize in the (Infrastructure-as-a-Service clouds) is facilitate the users to world of systematic computing where the use of batch retrieve their resources on demand. But, to afford on-demand schedulers classically ensures high exploitation and thus access, cloud centers must either drastically abundance their much better resource paying off. Thus, latent low infrastructure (and pay a high price for operating resources exploitation constitutes a momentous impending problem to with low utilization) or reject a large proportion of user the espousal of cloud computing in the systematic world. requests (in which case the access is no longer on-demand). Several models, applications and workflows are implemented At the similar instance, while the on-demand capabilities for recovering the resources where interruptions in service are of IaaS clouds are supreme for many scientific use cases, predictable. For instance, many researchers and scientists there are others that do not essentially need on-demand utilize HTC (High Throughput Computing) enabled resources, access to resources. Several systems, specifically volunteer such as Condor, where jobs are dispatched to available computing systems such as SETI@Home and resources and terminated when the resource is no longer Folding@Home, are capable of taking advantage of available. resources available opportunistically and are also AS a solution we propose a special infrastructure for the perceptible, i.e., intended as breakdown supple systems cloud centers that overlaps on-demand allocation of resources where interruptions in service can be handled without with opportunistic provisioning of cycles from inactive cloud nodes to other processes by installing backfill Virtual Machines compromising the integrity of computation. One pattern in (VMs). For manifestation and tentative evaluation, we extend the scientific community is the use of HTC (high throughput the Nimbus cloud computing toolkit to deploy backfill VMs on computing), as developed by e.g., the Condor system where idle cloud nodes for dispensation an HTC workload. We exhibit users occupy HTC [1] enabled resources to route their that a mutual infrastructure amid IaaS cloud providers and an workloads. These applications are intended to “forage” HTC job supervision system can be highly beneficial to both the unused resource cycles: for example, when a user stops using IaaS cloud provider and HTC users by increasing the their desktop, the screensaver might use the resource to run a consumption of the cloud infrastructure and contributing cycles volunteer computing program. The job may then be pre-empt that would otherwise be idle to processing HTC jobs. when the resource becomes engaged i.e., the user is using it again, in which case the job is typically requeued and Keywords: IaaS, improving cloud infrastructure. rescheduled on another available resource by the HTC system that manages it. I. INTRODUCTION Infrastructure-as-a-Service (IaaS) cloud computing has emerged as an striking substitute to the attainment and management of physical resources. The on-demand provisioning it ropes allows users to elastically enlarge and pact the reserve base available to them based on an immediate require - a pattern that enables a quick turnaround time when dealing with emergencies, working towards deadlines, or growing an institutional resource base. This pattern makes it expedient for institutions to configure private clouds that allow their users a seamless or near seamless transition to community or commercial clouds supporting compatible VM images and cloud interfaces. Such private clouds are characteristically configured with open source IaaS implementations such as Nimbus or Eucalyptus. Nonetheless, such private cloud deployment also faces a exploitation trouble. In order to guarantee on-demand Figure 1 Backfill Virtual Machine example accessibility a provider needs to abundance: keep a large part of nodes idle so that they can be used to gratify an on-demand In this paper we proposing a infrastructure cloud that request, which could come at any time. The need to remain all merges on-demand allowance of assets with opportunistic these nodes inoperative leads to short exploitation. The only provisioning of cycles from idle cloud nodes to other way to improve it is to keep fewer nodes idle. However this processes, such as by installing backfill VMs. Backfill VMs means potentially avoiding a higher proportion of desires to a are installed on inactive cloud nodes and can be configured to point at which a provider does not provides on-demand 367 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 execute any preferred role. A VM is concluded while the A. Architecture resource is desired to gratify an on-demand request. If we The figure 1 illustrates the infrastructure of service cloud; make certain that the computation happening in backfill VMs in this instance the client submits 3 individual tasks to the is pliant to such sudden extinction, the time that would Condor master, which is able to schedule 1 task immediately otherwise be idle can be valuably tired. Overall, [7] these on a local worker. But, because the left over resources in site propose achieves two goals: for cloud providers, it offers a B’s Condor pool are hectic, Condor leverages the cycles path to advanced utilized clouds; for cloud users, it offers provided by site A’s backfill VMs to launch the other 2 tasks another type of reserve lease, potentially cheaper than without delay. Condor is a superlative entrant for such a on-demand, nonpreemptible resource. operation because of its original plan as a cycle-scavenger In our proposal we widen the Nimbus toolkit to install where inactive desktop systems execute jobs until the backfill VMs on idle Virtual Machine Monitor (VMM) system’s user returns, after which the job is either migrated to nodes. There are so many open source toolkits are available, another system or prematurely terminated and re-launched on Nimbus is also a open source toolkit for deploying IaaS another system. Condor [3] is a superlative entrant for such a clouds, planned with extensibility in mind, which makes it operation because of its original plan as a cycle-scavenger mainly appropriate for projects such as the one described where inactive desktop systems execute jobs until the here. To exemplify our system behavior, we shape the system’s user returns, after which the job is either migrated to backfill VMs as Condor workers that integrate with a Condor another system or prematurely terminated and re-launched on pool to process jobs. We appraise the capability of the system another system. Backfill exploitation could be much more to augment exploitation of the IaaS cloud infrastructure composite then the example depicted in Figure 1. without sacrificing the capacity of the IaaS cloud to provision Cloud administrators of IaaS should consider a diversity resources on-demand. We find that throughout certain of different backfill configurations while installing a backfill portions of our trial assessment backfill VMs contribute to an resolution on an IaaS cloud. The configuration is prejudiced increase in the utilization of the IaaS cloud infrastructure by the uniqueness of the original physical IaaS resources, the from 38.5% to 100% with only 6.39% overhead cost for users of on-demand leases, and the users of preemptible processing the workload. leases. First, suitable backfill functions and flow of works must II. APPROACH be identified. These functions must contain the constraints A total infrastructure cloud operates by allowing a user to discussed earlier, namely, they must be proficient to employ a make leases against its group of resources; an infrastructure changeable number of nodes that may join or leave the lease makes a resource accessible to the user based on set of system at any time. Second, install a single VM for each core lease stipulations defining the accessibility, capability and on the virtual machine monitor (VMM) node, Third, the IaaS universal circumstances of a lease. In our system we focus on cloud administrator have to resolve the inexact volume of the investigating two types of leases: backfill deployment, relative to the volume of the IaaS cloud.  On-demand, non-preemptible and stretchy leases grant a Finally, the IaaS cloud administrator has to resolve the user admission to a resource within interactive time of backfill VM image installation method. assembly the request and make the resource accessible B. Backfill termination policies for an agreed-upon period of time. The user can deploy any VM attuned with the system. Backfill VMs are installed on inactive VMM nodes and terminated whenever space is needed to service an  Opportunistic, preemptible and pre-set leases grant a user on-demand lease. But, the precise backfill VMs that are admission to a resource at an indefinite time and make selected for termination might collision the services, the resource accessible to the user for an indefinite applications, or workflows executing inside those VMs. For amount of time. Further, this resource is pre-defined for this rationale, preferably the backfill VM termination policies the user by the cloud manager, i.e. the user cannot should consider the applications and services running inside provide his or her own VM. those VMs as well as general factors such as the need for clean shutdown, the ability of an application to In the circumstance of IaaS clouds, backfill VMs are checkpoint/restart, etc. We are using two simple policies that broad VMs deployed on IaaS resources using a preemptible do not integrate such hints and highlight their shortcomings. lease that may be configured to execute any function.  Random selection of VMs to terminate. The VMs have two main constraints, in the on-demand  Selecting least running VMs. lease backfill VMs could be concluded abruptly to free up space for the IaaS cloud administrator, another one is, III. IMPLIMENTATION because of the erratic timing of on-demand leases, a changeable amount of backfill VMs may be accessible at any We broaden the open source Nimbus cloud computing given time. So, we suppose that applications executing within toolkit, which facilitates on-demand entrée to resources, to backfill VMs are planned to knob environments that contain support the exploitation of preemptible leases on inactive a changeable amount of employees that may join or leave the cloud nodes, also referred to as backfill. We make a variety of system at any time. simplifying assumptions in our present realization. First, the Some applications are not well-matched for these volatile cloud administrators have to organize VMs. Second, the environments, for example, analogous applications that present realization is proficient of using just a single backfill necessitate all processes to be nearby for the extent of the VM image per VMM node. Diverse backfill VM metaphors application’s execution and require checkpoint or restart may possibly be installed on different VMM nodes, allowing capabilities. All Rights Reserved © 2012 IJARCET 368
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 multiple backfill VM images to operate within the same IaaS Unpaid assistant computing systems, such as BOINC [4], cloud, each performing diverse functions. harvest cycles from idle systems distributed across the Unless the user specifies the max amount of backfill Internet. These applications are planned to contain instances, backfill involuntarily attempts to arrange as lots of interruptions in service since broadly distributed computers, backfill VMs as probable when it is enabled. Primarily, we operated by an ostensibly countless number of unrelated hold two annihilation policies for selecting backfill VMs for users, cannot provide any promise of service. termination in order to fulfill an on-demand lease. In the case of unpaid assistant computing systems Finally, our backfill achievement austerely terminates the interruption in service are typically the results of users backfill VM. Sparkling termination [6] requires extra habitual to their systems to do work, systems crashing, or instance over trashing the VM, even though, performing a systems becoming disconnected from the Internet. clean termination notifies services and applications running Applications that control unpaid assistant computing systems inside the backfill VM that the VM will be terminated, would be ideal candidates for backfill VMs because of their allowing them to respond appropriately. ability to handle unforeseen failures in service. In [2] we also influence recuperation techniques, Backfill arrangement options expressly pausing and resuming VMs, to achieve high The administrator of the cloud can merely organize the utilization of clloud infrastructures. While the craving of Backfill. The backfill.conf consists of the option which maintaining high utilization via introducing unlike types of allows the admin to organize the backfill VMs easily. The leases is the equivalent as the work described here, the leases backfill.conf options include backfill disabled, max themselves as well as the recuperation practice used, instances, disk image, duration seconds, termination policy, specifically that of suspending and resuming VMs is different retry period, network. from the focus in our work. as an alternative of using As piece of our modifications to the Nimbus terminal suspend/resume to support advanced worries we leverage a service, we also customized its scheduler to notice several recuperation system that uses resubmission (Condor) to discarded desires for on-demand user VMs. If we perceive an ensure that high utilization is achieved and no work is lost. unwanted on-demand user command and backfill is enabled, Amazon is an added area that shares associated themes to we endeavor to terminate the proper amount of backfill VMs our job is smudge pricing, as exemplified by. With spot so that the user appeal can be fulfilled [5]. pricing users place bids for instances and the cloud provider We endeavor to service the user requests once more after sporadically adjusts the price of smudge instances, the backfill VMs are terminated. If the user appeals are not terminating the smudge instances with bids that fall below the processed, we prolong terminating backfill VMs up to we new spot price and launching instances that meet or exceed are able to process the user requests and all backfill VMs are the spot price. Our effort uses the current demand for terminated. The user request is eliminated if all the VMs are on-demand user VMs to determine the accessibility for terminated and still helpless to service the use request. We backfill VMs while Amazon bases availability of spot also adapted the scheduler to perceive when on-demand users instances on a smudge price. are terminating VMs. V. CONCLUSIONS IV. RELATED WORK The main benefit of IaaS (Infrastructure-as-a-Service Infrastructure as a Service is a provision model in which an clouds) is facilitating the users to retrieve their resources on organization outsources the equipment used to support demand. But, to afford on-demand access, cloud centers must operations, including storage, hardware, servers and either drastically abundance their infrastructure (and pay a networking components. The service provider owns the high price for operating resources with low utilization) or equipment and is responsible for housing, running and reject a large proportion of user requests (in which case the maintaining it. The client typically pays on a per-use basis. access is no longer on-demand). Several models, applications Cloud computing is all the rage. "It's become the phrase du and workflows are implemented for recovering the resources jour," says Gartner senior analyst Ben Pring, echoing many where interruptions in service are predictable. For instance, of his peers. The problem is that (as with Web 2.0) everyone many researchers and scientists utilize HTC (High seems to have a different definition.As a metaphor for the Throughput Computing) enabled resources, such as Condor, Internet, "the cloud" is a familiar cliché, but when combined where jobs are dispatched to available resources and with "computing," the meaning gets bigger and fuzzier. Some terminated when the resource is no longer available. analysts and vendors define cloud computing narrowly as an AS a solution we proposed a special infrastructure for the updated version of utility computing: basically available over cloud centers that overlaps on-demand allocation of the Internet. Others go very broad, arguing anything you resources with opportunistic provisioning of cycles from consume outside the firewall is "in the cloud," including inactive cloud nodes to other processes by installing backfill conventional outsourcing. Virtual Machines (VMs). For manifestation and tentative evaluation, we extend the Nimbus cloud computing toolkit to Even if our effort utilizes backfill to attain high utilization deploy backfill VMs on idle cloud nodes for dispensation an of a cloud infrastructure, it is diverse from work that uses HTC workload. We exhibit that a mutual infrastructure amid backfill arrangement to augment the exploitation of large IaaS cloud providers and an HTC job supervision system can computers. Grounding on computers does not obviously be highly beneficial to both the IaaS cloud provider and HTC presume that backfill tasks will be preempted by an users by increasing the consumption of the cloud on-demand stipulate, looking for directly access the resources, while our work assumes this to be the default case. 369 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 infrastructure and contributing cycles that would otherwise be idle to processing HTC jobs. REFERENCES [1] Nimbus 2.6 Backfill (prototype). GitHub. [Online]. Retreived December 6, 2010, from: ttps://github.com/pdmars/nimbus/tree/backfill-2.6 [2] Nimbus. [Online]. Retreived December 6, 2010, from:http://www.nimbusproject.org/ [3] Nurmi D, Wolski R, Grzegorczyk C, Obertelli G, Soman S, Youseff and Zagorodnov D. Eucalyptus opensource cloud-computing system. In CCA08: Cloud Computing and Its Applications, 2008. [4] Ren X, Lee S, Eigenmann R, and Bagchi S. “Resource Failure Prediction in Fine-Grained Cycle Sharing System,” HPDC ’06, 2006. [5] Ryu K and Hollingsworth J. "Unobtrusiveness and Efficiency in Idle Cycle Stealing for PC Grids," in Proceedings of IPDPS’04, 2004, p. 62a. [6] Science Clouds. [Online]. Retreived December 6, 2010, from:http://www.scienceclouds.org/ [7] Smith, JE. and Nair, R. Virtual machines: versatile platforms for systems and processes. Morgan Kaufmann Publishers, San Francisco, CA, USA, 2005. All Rights Reserved © 2012 IJARCET 370