SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28




              Improving Utilization of Infrastructure Cloud
                                                                R . P. Jadhav
                           Department of Information Technology, G.H.Raisoni Institute of Engg. And Tech, Pune India




Abstract- A key advantage of Infrastructure-as-a-Service (IaaS) cloud      The illusion of infinite computing resources available
is providing users on-demand access to resources. However, to provide
on-demand access, cloud providers must either significantly
                                                                           on demand thereby eliminates the need for Cloud
overprovision their infrastructure (or pay a high price for operating      Computing users to plan far ahead for provisioning.
resources with low utilization) or reject a large proportion of user       The elimination of an up-front commitment by Cloud
requests (in which case the access is no longer on-demand). At the same
time, not all users require truly on-demand access to resources. Many
                                                                           users, thereby allowing companies to start small and
applications and workflows are designed for recoverable systems where      increase hardware resources only when there is an
interruptions in service are expected. For instance, many scientists       increase in their needs. The ability to pay for use of
utilize High Throughput Computing (HTC)-enabled resources, such as
Condor, where jobs are dispatched to available resources and
                                                                           computing resources on a short-term basis as needed
terminated when the resource is no longer available. We propose a          (e.g., processors by the hour and storage by the day)
cloud infrastructure that combines on-demand allocation of resources       and release them as needed, thereby rewarding
with opportunistic provisioning of cycles from idle cloud nodes to other
processes by deploying backfill Virtual Machines (VMs).
                                                                           conservation by letting machines and storage go when
                                                                           they are no longer useful.
Keywords: Infrastructure as service, High Throughput Computing,                   The system is very much needed in the current
Virtual Machine, idle cloud.                                               and future also. When we deal with any massive
                                                                           operation then in such case available computing
                          I.   INTRODUCTION                                resources are not sufficient. To perform the operation
                                                                           on the individual machine having the limited memory
    In the recent years, Infrastructure-as-a-Service                       and processing power, it takes too much time to
    (IaaS) cloud computing has emerged as an                               perform operation. But with this research we will be
    attractive alternative to the acquisition and                          able to perform the task by using cloud computing.
    management of physical resources. Infrastructure                       The use of the cloud computer will save the time of
    clouds are usually those offerings which give you                      the operation. Also the use of the cloud computing
    an infrastructure like Windows Azure or Amazon                         will use the available resources very efficiently. So
    upon which you can build almost any application.                       this research will be very useful when we have to
    The on demand provisioning it supports allows                          perform the operation very fast and using optimal
    users to elastically expand and contract the                           resources.
    resource base available to them based on an                                    As Clouds are emerging as next-generation
    immediate need – a pattern that enables a quick                        data centers and aim to support ubiquitous service-
    turnaround time when dealing with emergencies,                         oriented applications, it is important that they are
    working towards deadlines, or growing an                               designed to be energy efficient to reduce both their
    institutional resource base. This pattern makes it                     power bill and carbon footprint on the environment.
    convenient for institutions to configure private                       To achieve this at software systems level, we need to
    clouds that allow their users a seamless or near                       investigate new techniques for allocation of resources
    seamless transition to community or commercial                         to applications depending on quality of service,
    clouds supporting compatible VM images and                             expectations of users and service contracts established
    cloud interfaces. Such private clouds are typically                    between consumers and providers.
    configured       using    open     source     IaaS
    implementations such as Nimbus or Eucalyptus
    [1].


www.ijascse.in                                                                                                           Page 33
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28




II.   LITERATURE SURVEY                                   III. METHODOLOGY

A ) Infrastructure as a service (IaaS)                    This research covers two basic aspects
  IaaS provides simple provisioning of processing,            1. GPS location tracking-
storage, networks, and other fundamental computing        This part follows tracking users’ location through
resources over a network. With IaaS, IT services can      Google apps, hence registering a particular user in a
be delivered as a subscription service, eliminating up-   location hence finding out the area of his searching.
front costs and driving down ongoing support costs            2. Efficient      request     processing     through
(enabling companies to make a strategic shift from a              infrastructure clouds
CAPEX to OPEX-based business model). As with                      The processing of the request is processed
managed hosting, IaaS providers keep costs low by         through efficient scheduling of the task assignments to
pooling resources and giving customers access to a        the virtual nodes. The concept is implemented through
shared facility. But a major difference is that IaaS      FIFO scheduling and map-reduce of the Hadoop
resources are elastic and available on a self service,    infrastructure.
on-demand basis.                                                   The data to be searched should be kept
                                                          available on the cloud servers, so that the request
While IaaS providers often differ in their specific       would be directed to these servers through cloud
offerings, key features of all IaaS models include:       computing. This request processing takes the input as
‱ Instant deployment                                      the current user location along with the user’s search
‱ Ability to rapidly scale                                query and processes it through cloud to give the asked
‱ Lower TCO                                               results that would be displayed on the user’s cell
‱ Predictable uptime                                      phone.
                                                                  Also infrastructure cloud takes care of load
B ) GPS tracking                                          balancing that can be a very tedious aspect when seen
Google’s mobile version of Google Maps has always         through a large request processing system’s point of
offers the ability for mobile phone users to call up      view. This feature is elaborated through sending
Google Maps to view the map of a particular location      multiple threads of the request and hence testing the
or search for driving directions. Later, Google added     system’s load balancing capability.
the ability for users who had a GPS-enabled phone or              This research is tied to the boundary where it
Smartphone to locate their current location through       can process a request which is asked for the
satellite triangulation.                                  information that is basically satisfied by knowing the
         This is a very useful feature of Google Maps,    particular location of the user at current time.
and one that sets it above most other free mobile                 This location tracking is possible only when
mapping applications. However, since such a small         the user is connected to the internet through his cell
percentage of Google Mobile users actually own a          phone. Particularly the application should be deployed
GPS-enabled phone, Google decided to add GPS              on his cell phone and he must have the authorization
Tracking to Google Maps. It’s an amazing technology       to use it.
that offers any cell phone user, regardless of GPS                Also the load balancing part of the system is
functionality, the ability to zero on your current        seen to be satisfied by sending many numbers of
location. Google Maps does this the moment you start      requests to the system within a short interval of time.
up the application on your cell phone, as shown here      A graph showing the efficient utilization of all the
on my Cingular Smartphone.                                nodes is able to explain the working of cloud against
         Tracking a GPS enabled cell phone on Google      the time axis.[3]
maps Project includes J2ME cell phone source and
source code to display data on your own website. One
can choose between .NET and MS SQL Server or
PHP and MySQL.

www.ijascse.in                                                                                           Page 34
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28

                                                            Identifying major risks, both technical and
                                                            managerial, and determining how to lessen the risk
IV. SYSTEM CONSIDERATIONS                                   helps keep the software development process under
                                                            control[4].
      Location Tracking:
It is done through Google App
      Request Processing
The requests are handled through cloud installed on
hadoop server implementing the concept of map-
reduce.
    Load balancing
It is achieved through assigning the task in FIFO
ordering to the virtual cloud nodes. For that the
upcoming task is guided to the node which is idle for
the current instance of time, thereby reducing the
waiting time of the request.

 V. DESIGN CONSIDERATIONS

 A ) General constraints
Design is the technical kernel of the software
development. The Design speciïŹcation addresses
aspects of the design model. Software (IDE) like
Netbeans 7.0 is required. Implementation includes all
those activities that take place to convert from the old
system to the new. The old system consists of manual
operations, which is operated in a very diïŹ€erent
manner from the proposed new system. A proper
implementation is essential to provide a reliable                               Figure 1: spiral model
system to meet the requirements of the user. An
improper installation may aïŹ€ect the success of the          Starting at the center, each turn around the spiral goes
computerized system.Internet connectivity is essential      through several task regions:
for this product. It requires a latest supported browser.        Determine the objectives, alternatives, and
For latest update from Microsoft like AJAX toolkit                  constraints on the new iteration.
you require Internet Connectivity. Also it can help              Evaluate alternatives and identify and
you to recovery in IDE crash or stop working.                       resolve risk issues.
                                                                 Develop and verify the product for this
   B) Development Methods                                           iteration.
The development model is a spiral model. The                     Plan the next iteration.
spiral model combines the idea of iterative
development (prototyping) with the systematic,
controlled aspects of the waterfall model. It allows
for incremental releases of the product, or
incremental refinement through each time around
the spiral. The spiral model also explicitly includes
risk management within software development.
www.ijascse.in                                                                                             Page 35
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28




                                                                           Request Processing
                                                                           and Scheduling of
                                                                           task


                                               V
                                               M



                                                                  DB search
             Cell    Request
             phone                                                                    DB
                                              V
                                              M                                       Server

                     Processed                                    Retrieved
                     result                                       data

                                              V
                                              M




                 INTERNET                     Server




                                 Figure 2 System Architecture

www.ijascse.in                                                                                  Page 36
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28




VI.      RESULTS

Results of the researsh carried out are shown as below




                                                                   Figure 5. Login Screen
                                                                   This figure shows login screen.




Figure 3. Home Screen

Figure 3 shows the home screen of this research.




                                                                    Figure 6. Input Screen


                                                                   Figure 4 & 6 shows menu selection & Input screen.

Figure 4. Menu Selection Screen


www.ijascse.in                                                                                                 Page 37
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28

                                                  Figure 7 shows the information retrieval after giving
                                                  some input & Figure 8 shows map releated to
                                                  information that is retrieved.




                                                  Figure 9 . Login to Database Server




Figure 7. Information Retrieval




                                                  Figure 10 . Home page at Server Side




Figure 8. Map Retreival



                                                  Figure 11 . Add New Record

www.ijascse.in                                                                                Page 38
IJASCSE, Vol 2, Issue 1, 2013
 Feb. 28


                                                    VII.     FUTURE ENHANCEMENTS
Figure 9, 10, 11 shows server side login page &
Insertion of new record.                                 Even though the system has succeeded to achieve
                                                    the said goal, the system can be enhanced by doing
                                                    some additional work in upcoming future. They can
                                                    be summarized as

                                                             Standard security algorithms can be
                                                              implemented to enhance the security.
                                                             The systems working could be made
                                                              autonomous.
                                                             The backup of the database can be taken
                                                              periodically to optimize recovering from the
                                                              crash or failures.
                                                             The application can be made compatible for
                                                              various operating systems.



                                                             VIII CONCLUSION

                                                    This research achieves the goal of its desired
                                                    functions, which are GPS tracking, and efficient
Figure 12. Existing Database
                                                    request handling through cloud computing.

                                                    The research hence reassures the effectiveness of
                                                    using Infrastructure clouds when the system needs to
                                                    meet the requirement of high load.

                                                    In this paper we propose a cloud infrastructure that
                                                    combines on-demand allocation of resources with
                                                    opportunistic provisioning of cycles from idle cloud
                                                    nodes to other processes, by deploying backfill VMs.


                                                    REFERENCES

                                                [1] [1] Paul Marshall - Improving Utilization of Infrastructure Cloud 2011
                                                    IEEE 11th International Conference.
                                                [2] [2] Woitaszek, M. and Tufo, H., “Developing a cloud computing
                                                    charging model for high-performance computing resources,” in
                                                    Computer and Information Technology (CIT), 2010 IEEE 10th
                                                    International Conference on, July 2010, pp. 210–217.
                                                [3] [3] Anderson, D. “BOINC: A System for Public-Resource Computing
                                                    and Storage,” 5th IEEE/ACM Workshop on Grid Computing, Nov.
Figure 13. Cloud Server                             2004.
                                                [4] [4] Woitaszek, M. and Tufo, H., “Developing a cloud computing
                                                    charging model for high-performance computing resources,” in
                                                    Computer and Information Technology (CIT), 2010 IEEE 10th
                                                    International Conference on, July 2010, pp. 210–217.



www.ijascse.in                                                                                                 Page 39
IJASCSE, Vol 2, Issue 1, 2013
      Feb. 28




[5] [5] He, C., Gu, L., Du, B., Li, Z.: A WSLA-based monitoring system for
    grid service-GSMon. In: 2004 IEEE International Conference on
    Services Computing, 2004.(SCC 2004). Proceedings. (2004) 596




    www.ijascse.in                                                                        Page 40

Weitere Àhnliche Inhalte

Was ist angesagt?

BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)JNicholson
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Cloud Technology_Concepts
Cloud Technology_ConceptsCloud Technology_Concepts
Cloud Technology_ConceptseGuvernare_Moldova
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Paper444012-4014
Paper444012-4014Paper444012-4014
Paper444012-4014saumya yuval
 
T04503113118
T04503113118T04503113118
T04503113118IJERA Editor
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing white paper
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05eGuvernare_Moldova
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaSoftware Guru
 
E04432934
E04432934E04432934
E04432934IOSR-JEN
 
Cloud building
Cloud buildingCloud building
Cloud buildingWahid Cirebon
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
 
A viewof cloud computing
A viewof cloud computingA viewof cloud computing
A viewof cloud computingpurplesea
 
Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1Bill Alatis
 
Energy efficient resource allocation in cloud computing
Energy efficient resource allocation in cloud computingEnergy efficient resource allocation in cloud computing
Energy efficient resource allocation in cloud computingDivaynshu Totla
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingIBM India Smarter Computing
 

Was ist angesagt? (20)

BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Cloud Technology_Concepts
Cloud Technology_ConceptsCloud Technology_Concepts
Cloud Technology_Concepts
 
Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Paper444012-4014
Paper444012-4014Paper444012-4014
Paper444012-4014
 
T04503113118
T04503113118T04503113118
T04503113118
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Application Architecture for Cloud Computing
Application Architecture for Cloud Computing Application Architecture for Cloud Computing
Application Architecture for Cloud Computing
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la EmpresaCloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
Cloud Computing: On the Air or Down to Earth - Beneficios para la Empresa
 
E04432934
E04432934E04432934
E04432934
 
Cloud building
Cloud buildingCloud building
Cloud building
 
Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing Scheduling in Virtual Infrastructure for High-Throughput Computing
Scheduling in Virtual Infrastructure for High-Throughput Computing
 
A viewof cloud computing
A viewof cloud computingA viewof cloud computing
A viewof cloud computing
 
Datacenter Of The Future Article - - Jon Greaves 1
Datacenter Of The Future Article - -  Jon Greaves 1Datacenter Of The Future Article - -  Jon Greaves 1
Datacenter Of The Future Article - - Jon Greaves 1
 
Energy efficient resource allocation in cloud computing
Energy efficient resource allocation in cloud computingEnergy efficient resource allocation in cloud computing
Energy efficient resource allocation in cloud computing
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
 

Andere mochten auch

Green Storage 1: Economics, Environment, Energy and Engineering
Green Storage 1: Economics, Environment, Energy and EngineeringGreen Storage 1: Economics, Environment, Energy and Engineering
Green Storage 1: Economics, Environment, Energy and Engineeringdigitallibrary
 
Agile Product Management Basics
Agile Product Management BasicsAgile Product Management Basics
Agile Product Management BasicsRich Mironov
 
Practical introduction to hadoop
Practical introduction to hadoopPractical introduction to hadoop
Practical introduction to hadoopinside-BigData.com
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
Compulsory motor third party liability in Mozambique
Compulsory motor third party liability in MozambiqueCompulsory motor third party liability in Mozambique
Compulsory motor third party liability in MozambiqueTristan Wiggill
 
Informatica transformation guide
Informatica transformation guideInformatica transformation guide
Informatica transformation guidesonu_pal
 
Top 8 print production manager resume samples
Top 8 print production manager resume samplesTop 8 print production manager resume samples
Top 8 print production manager resume sampleskelerdavi
 
Optimized Learning and Development
Optimized Learning and Development Optimized Learning and Development
Optimized Learning and Development AIESEC
 
How to measure illumination
How to measure illuminationHow to measure illumination
How to measure illuminationajsatienza
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management ExcellenceChange Management Institute
 
User Behavior Tracking with Google Analytics, Garb, and Vanity
User Behavior Tracking with Google Analytics, Garb, and VanityUser Behavior Tracking with Google Analytics, Garb, and Vanity
User Behavior Tracking with Google Analytics, Garb, and VanityTony Pitale
 
Software QA Metrics Dashboard Benchmarking
Software QA Metrics Dashboard BenchmarkingSoftware QA Metrics Dashboard Benchmarking
Software QA Metrics Dashboard BenchmarkingJohn Carter
 
Promotion in the internet marketing mix
Promotion in the internet marketing mixPromotion in the internet marketing mix
Promotion in the internet marketing mixNadiaElSamsam
 
Advertising photography
Advertising photographyAdvertising photography
Advertising photographyRyan Broome
 
Revenue cycle management presentation
Revenue cycle management presentationRevenue cycle management presentation
Revenue cycle management presentationfernan716
 

Andere mochten auch (20)

Green Storage 1: Economics, Environment, Energy and Engineering
Green Storage 1: Economics, Environment, Energy and EngineeringGreen Storage 1: Economics, Environment, Energy and Engineering
Green Storage 1: Economics, Environment, Energy and Engineering
 
Agile Product Management Basics
Agile Product Management BasicsAgile Product Management Basics
Agile Product Management Basics
 
Practical introduction to hadoop
Practical introduction to hadoopPractical introduction to hadoop
Practical introduction to hadoop
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Basics of print planning
Basics of print planningBasics of print planning
Basics of print planning
 
Compulsory motor third party liability in Mozambique
Compulsory motor third party liability in MozambiqueCompulsory motor third party liability in Mozambique
Compulsory motor third party liability in Mozambique
 
Informatica transformation guide
Informatica transformation guideInformatica transformation guide
Informatica transformation guide
 
Top 8 print production manager resume samples
Top 8 print production manager resume samplesTop 8 print production manager resume samples
Top 8 print production manager resume samples
 
Optimized Learning and Development
Optimized Learning and Development Optimized Learning and Development
Optimized Learning and Development
 
How to measure illumination
How to measure illuminationHow to measure illumination
How to measure illumination
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
6 May 2015 - INCREASING BANKING SALES PRODUCTIVITY - Management Excellence
 
User Behavior Tracking with Google Analytics, Garb, and Vanity
User Behavior Tracking with Google Analytics, Garb, and VanityUser Behavior Tracking with Google Analytics, Garb, and Vanity
User Behavior Tracking with Google Analytics, Garb, and Vanity
 
Software QA Metrics Dashboard Benchmarking
Software QA Metrics Dashboard BenchmarkingSoftware QA Metrics Dashboard Benchmarking
Software QA Metrics Dashboard Benchmarking
 
Promotion in the internet marketing mix
Promotion in the internet marketing mixPromotion in the internet marketing mix
Promotion in the internet marketing mix
 
INTEL
INTELINTEL
INTEL
 
IHC
IHCIHC
IHC
 
Advertising photography
Advertising photographyAdvertising photography
Advertising photography
 
Revenue cycle management presentation
Revenue cycle management presentationRevenue cycle management presentation
Revenue cycle management presentation
 
E learning Implementation strategy
E learning Implementation strategyE learning Implementation strategy
E learning Implementation strategy
 

Ähnlich wie Improving Cloud Resource Utilization

Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...AM Publications
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...IOSR Journals
 
Cloud computing
Cloud computingCloud computing
Cloud computingsreeharsha43
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewIJEACS
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
Allocation Strategies of Virtual Resources in Cloud-Computing Networks
Allocation Strategies of Virtual Resources in Cloud-Computing NetworksAllocation Strategies of Virtual Resources in Cloud-Computing Networks
Allocation Strategies of Virtual Resources in Cloud-Computing NetworksIJERA Editor
 
’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment ’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment Intel Corporation
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudEditor IJCATR
 
Presentation
PresentationPresentation
PresentationJaspreet1192
 
Cloud computing Project from ganesh
Cloud computing Project  from ganeshCloud computing Project  from ganesh
Cloud computing Project from ganeshGanesh ReddyCse
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingsuraj bhandari
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚lantianlcdx
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationVaibhav Khanna
 

Ähnlich wie Improving Cloud Resource Utilization (20)

367 370
367 370367 370
367 370
 
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
Improved Utilization of Infrastructure of Clouds by using Upgraded Functional...
 
D017212027
D017212027D017212027
D017212027
 
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
484 488
484 488484 488
484 488
 
Understanding the Cloud Computing: A Review
Understanding the Cloud Computing: A ReviewUnderstanding the Cloud Computing: A Review
Understanding the Cloud Computing: A Review
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
119 125
119 125119 125
119 125
 
119 125
119 125119 125
119 125
 
Allocation Strategies of Virtual Resources in Cloud-Computing Networks
Allocation Strategies of Virtual Resources in Cloud-Computing NetworksAllocation Strategies of Virtual Resources in Cloud-Computing Networks
Allocation Strategies of Virtual Resources in Cloud-Computing Networks
 
’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment ’Cloudbursting’ for Operational and Tactical Employment
’Cloudbursting’ for Operational and Tactical Employment
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in Cloud
 
Presentation
PresentationPresentation
Presentation
 
Cloud computing Project from ganesh
Cloud computing Project  from ganeshCloud computing Project  from ganesh
Cloud computing Project from ganesh
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
N1803048386
N1803048386N1803048386
N1803048386
 

Mehr von IJASCSE

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales ForecastingIJASCSE
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...IJASCSE
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...IJASCSE
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureIJASCSE
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsIJASCSE
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansIJASCSE
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningIJASCSE
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...IJASCSE
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsIJASCSE
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerIJASCSE
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...IJASCSE
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...IJASCSE
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsIJASCSE
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...IJASCSE
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...IJASCSE
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkIJASCSE
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...IJASCSE
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelIJASCSE
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 

Mehr von IJASCSE (20)

Inter Time Series Sales Forecasting
Inter Time Series Sales ForecastingInter Time Series Sales Forecasting
Inter Time Series Sales Forecasting
 
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
Independent Component Analysis for Filtering Airwaves in Seabed Logging Appli...
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Four Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape SignatureFour Side Distance: A New Fourier Shape Signature
Four Side Distance: A New Fourier Shape Signature
 
Theoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel SectionsTheoretical study of axially compressed Cold Formed Steel Sections
Theoretical study of axially compressed Cold Formed Steel Sections
 
Improved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-MeansImproved Performance of Unsupervised Method by Renovated K-Means
Improved Performance of Unsupervised Method by Renovated K-Means
 
A Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and LearningA Study on the Effectiveness of Computer Games in Teaching and Learning
A Study on the Effectiveness of Computer Games in Teaching and Learning
 
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
Clustering Based Lifetime Maximizing Aggregation Tree for Wireless Sensor Net...
 
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column SectionsDesign Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
Design Equation for CFRP strengthened Cold Formed Steel Channel Column Sections
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
A Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layerA Study on Thermal behavior of Nano film as thermal interface layer
A Study on Thermal behavior of Nano film as thermal interface layer
 
Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...Performance analysis of a model predictive unified power flow controller (MPU...
Performance analysis of a model predictive unified power flow controller (MPU...
 
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
Synthesis and structural properties of Mg (OH)2 on RF sputtered Mg thin films...
 
Evaluation of Exception Handling Metrics
Evaluation of Exception Handling MetricsEvaluation of Exception Handling Metrics
Evaluation of Exception Handling Metrics
 
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
Investigation of Integrated Rectangular SIW Filter and Rectangular Microstrip...
 
An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...An effect of synthesis parameters on structural properties of AlN thin films ...
An effect of synthesis parameters on structural properties of AlN thin films ...
 
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor NetworkCluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
Cluster-based Target Tracking and Recovery Algorithm in Wireless Sensor Network
 
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
Analysis and Design of Lead Salt PbSe/PbSrSe Single Quantum Well In the Infra...
 
Portfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz modelPortfolio Analysis in US stock market using Markowitz model
Portfolio Analysis in US stock market using Markowitz model
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 

KĂŒrzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

KĂŒrzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Improving Cloud Resource Utilization

  • 1. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Improving Utilization of Infrastructure Cloud R . P. Jadhav Department of Information Technology, G.H.Raisoni Institute of Engg. And Tech, Pune India Abstract- A key advantage of Infrastructure-as-a-Service (IaaS) cloud The illusion of infinite computing resources available is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly on demand thereby eliminates the need for Cloud overprovision their infrastructure (or pay a high price for operating Computing users to plan far ahead for provisioning. resources with low utilization) or reject a large proportion of user The elimination of an up-front commitment by Cloud requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access to resources. Many users, thereby allowing companies to start small and applications and workflows are designed for recoverable systems where increase hardware resources only when there is an interruptions in service are expected. For instance, many scientists increase in their needs. The ability to pay for use of utilize High Throughput Computing (HTC)-enabled resources, such as Condor, where jobs are dispatched to available resources and computing resources on a short-term basis as needed terminated when the resource is no longer available. We propose a (e.g., processors by the hour and storage by the day) cloud infrastructure that combines on-demand allocation of resources and release them as needed, thereby rewarding with opportunistic provisioning of cycles from idle cloud nodes to other processes by deploying backfill Virtual Machines (VMs). conservation by letting machines and storage go when they are no longer useful. Keywords: Infrastructure as service, High Throughput Computing, The system is very much needed in the current Virtual Machine, idle cloud. and future also. When we deal with any massive operation then in such case available computing I. INTRODUCTION resources are not sufficient. To perform the operation on the individual machine having the limited memory In the recent years, Infrastructure-as-a-Service and processing power, it takes too much time to (IaaS) cloud computing has emerged as an perform operation. But with this research we will be attractive alternative to the acquisition and able to perform the task by using cloud computing. management of physical resources. Infrastructure The use of the cloud computer will save the time of clouds are usually those offerings which give you the operation. Also the use of the cloud computing an infrastructure like Windows Azure or Amazon will use the available resources very efficiently. So upon which you can build almost any application. this research will be very useful when we have to The on demand provisioning it supports allows perform the operation very fast and using optimal users to elastically expand and contract the resources. resource base available to them based on an As Clouds are emerging as next-generation immediate need – a pattern that enables a quick data centers and aim to support ubiquitous service- turnaround time when dealing with emergencies, oriented applications, it is important that they are working towards deadlines, or growing an designed to be energy efficient to reduce both their institutional resource base. This pattern makes it power bill and carbon footprint on the environment. convenient for institutions to configure private To achieve this at software systems level, we need to clouds that allow their users a seamless or near investigate new techniques for allocation of resources seamless transition to community or commercial to applications depending on quality of service, clouds supporting compatible VM images and expectations of users and service contracts established cloud interfaces. Such private clouds are typically between consumers and providers. configured using open source IaaS implementations such as Nimbus or Eucalyptus [1]. www.ijascse.in Page 33
  • 2. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 II. LITERATURE SURVEY III. METHODOLOGY A ) Infrastructure as a service (IaaS) This research covers two basic aspects IaaS provides simple provisioning of processing, 1. GPS location tracking- storage, networks, and other fundamental computing This part follows tracking users’ location through resources over a network. With IaaS, IT services can Google apps, hence registering a particular user in a be delivered as a subscription service, eliminating up- location hence finding out the area of his searching. front costs and driving down ongoing support costs 2. Efficient request processing through (enabling companies to make a strategic shift from a infrastructure clouds CAPEX to OPEX-based business model). As with The processing of the request is processed managed hosting, IaaS providers keep costs low by through efficient scheduling of the task assignments to pooling resources and giving customers access to a the virtual nodes. The concept is implemented through shared facility. But a major difference is that IaaS FIFO scheduling and map-reduce of the Hadoop resources are elastic and available on a self service, infrastructure. on-demand basis. The data to be searched should be kept available on the cloud servers, so that the request While IaaS providers often differ in their specific would be directed to these servers through cloud offerings, key features of all IaaS models include: computing. This request processing takes the input as ‱ Instant deployment the current user location along with the user’s search ‱ Ability to rapidly scale query and processes it through cloud to give the asked ‱ Lower TCO results that would be displayed on the user’s cell ‱ Predictable uptime phone. Also infrastructure cloud takes care of load B ) GPS tracking balancing that can be a very tedious aspect when seen Google’s mobile version of Google Maps has always through a large request processing system’s point of offers the ability for mobile phone users to call up view. This feature is elaborated through sending Google Maps to view the map of a particular location multiple threads of the request and hence testing the or search for driving directions. Later, Google added system’s load balancing capability. the ability for users who had a GPS-enabled phone or This research is tied to the boundary where it Smartphone to locate their current location through can process a request which is asked for the satellite triangulation. information that is basically satisfied by knowing the This is a very useful feature of Google Maps, particular location of the user at current time. and one that sets it above most other free mobile This location tracking is possible only when mapping applications. However, since such a small the user is connected to the internet through his cell percentage of Google Mobile users actually own a phone. Particularly the application should be deployed GPS-enabled phone, Google decided to add GPS on his cell phone and he must have the authorization Tracking to Google Maps. It’s an amazing technology to use it. that offers any cell phone user, regardless of GPS Also the load balancing part of the system is functionality, the ability to zero on your current seen to be satisfied by sending many numbers of location. Google Maps does this the moment you start requests to the system within a short interval of time. up the application on your cell phone, as shown here A graph showing the efficient utilization of all the on my Cingular Smartphone. nodes is able to explain the working of cloud against Tracking a GPS enabled cell phone on Google the time axis.[3] maps Project includes J2ME cell phone source and source code to display data on your own website. One can choose between .NET and MS SQL Server or PHP and MySQL. www.ijascse.in Page 34
  • 3. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Identifying major risks, both technical and managerial, and determining how to lessen the risk IV. SYSTEM CONSIDERATIONS helps keep the software development process under control[4].  Location Tracking: It is done through Google App  Request Processing The requests are handled through cloud installed on hadoop server implementing the concept of map- reduce.  Load balancing It is achieved through assigning the task in FIFO ordering to the virtual cloud nodes. For that the upcoming task is guided to the node which is idle for the current instance of time, thereby reducing the waiting time of the request. V. DESIGN CONSIDERATIONS A ) General constraints Design is the technical kernel of the software development. The Design speciïŹcation addresses aspects of the design model. Software (IDE) like Netbeans 7.0 is required. Implementation includes all those activities that take place to convert from the old system to the new. The old system consists of manual operations, which is operated in a very diïŹ€erent manner from the proposed new system. A proper implementation is essential to provide a reliable Figure 1: spiral model system to meet the requirements of the user. An improper installation may aïŹ€ect the success of the Starting at the center, each turn around the spiral goes computerized system.Internet connectivity is essential through several task regions: for this product. It requires a latest supported browser.  Determine the objectives, alternatives, and For latest update from Microsoft like AJAX toolkit constraints on the new iteration. you require Internet Connectivity. Also it can help  Evaluate alternatives and identify and you to recovery in IDE crash or stop working. resolve risk issues.  Develop and verify the product for this B) Development Methods iteration. The development model is a spiral model. The  Plan the next iteration. spiral model combines the idea of iterative development (prototyping) with the systematic, controlled aspects of the waterfall model. It allows for incremental releases of the product, or incremental refinement through each time around the spiral. The spiral model also explicitly includes risk management within software development. www.ijascse.in Page 35
  • 4. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Request Processing and Scheduling of task V M DB search Cell Request phone DB V M Server Processed Retrieved result data V M INTERNET Server Figure 2 System Architecture www.ijascse.in Page 36
  • 5. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 VI. RESULTS Results of the researsh carried out are shown as below Figure 5. Login Screen This figure shows login screen. Figure 3. Home Screen Figure 3 shows the home screen of this research. Figure 6. Input Screen Figure 4 & 6 shows menu selection & Input screen. Figure 4. Menu Selection Screen www.ijascse.in Page 37
  • 6. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 Figure 7 shows the information retrieval after giving some input & Figure 8 shows map releated to information that is retrieved. Figure 9 . Login to Database Server Figure 7. Information Retrieval Figure 10 . Home page at Server Side Figure 8. Map Retreival Figure 11 . Add New Record www.ijascse.in Page 38
  • 7. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 VII. FUTURE ENHANCEMENTS Figure 9, 10, 11 shows server side login page & Insertion of new record. Even though the system has succeeded to achieve the said goal, the system can be enhanced by doing some additional work in upcoming future. They can be summarized as  Standard security algorithms can be implemented to enhance the security.  The systems working could be made autonomous.  The backup of the database can be taken periodically to optimize recovering from the crash or failures.  The application can be made compatible for various operating systems. VIII CONCLUSION This research achieves the goal of its desired functions, which are GPS tracking, and efficient Figure 12. Existing Database request handling through cloud computing. The research hence reassures the effectiveness of using Infrastructure clouds when the system needs to meet the requirement of high load. In this paper we propose a cloud infrastructure that combines on-demand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes, by deploying backfill VMs. REFERENCES [1] [1] Paul Marshall - Improving Utilization of Infrastructure Cloud 2011 IEEE 11th International Conference. [2] [2] Woitaszek, M. and Tufo, H., “Developing a cloud computing charging model for high-performance computing resources,” in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, July 2010, pp. 210–217. [3] [3] Anderson, D. “BOINC: A System for Public-Resource Computing and Storage,” 5th IEEE/ACM Workshop on Grid Computing, Nov. Figure 13. Cloud Server 2004. [4] [4] Woitaszek, M. and Tufo, H., “Developing a cloud computing charging model for high-performance computing resources,” in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, July 2010, pp. 210–217. www.ijascse.in Page 39
  • 8. IJASCSE, Vol 2, Issue 1, 2013 Feb. 28 [5] [5] He, C., Gu, L., Du, B., Li, Z.: A WSLA-based monitoring system for grid service-GSMon. In: 2004 IEEE International Conference on Services Computing, 2004.(SCC 2004). Proceedings. (2004) 596 www.ijascse.in Page 40