SlideShare ist ein Scribd-Unternehmen logo
1 von 7
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
PACK Prediction-Based Cloud Bandwidth and Cost Reduction 
System 
In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy 
elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to 
apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the 
additional cost of TRE computation and storage would be optimized. PACK’s main advantage is 
its capability of offloading the cloud-server TRE effort to end clients, thus minimizing the 
processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not 
require the server to continuously maintain clients’ status. This makes PACK very suitable for 
pervasive computation environments that combine client mobility and server migration to 
maintain cloud elasticity. PACK is based on a novel TRE technique, which allows the client to 
use newly received chunks to identify previously received chunk chains, which in turn can be 
used as reliable predictors to future transmitted chunks. We present a fully functional PACK 
implementation, transparent to all TCP-based applications and network devices. Finally, we 
analyze PACK benefits for cloud users, using traffic traces from various sources. 
Contact: 9703109334, 9533694296 
ABSTRACT: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
AIM: 
The main aim of this project is PACK based on a novel TRE technique, which allows the 
client to use newly received chunks to identify previously received chunk chains, which in turn 
can be used as reliable predictors to future transmitted chunks. 
SYNOPSIS: 
Cloud computing offers its customers an economical and convenient pay-as-you-go 
service model, known also as usage-based pricing. Cloud customers1 pay only for the actual use 
of computing resources, storage, and bandwidth, according to their changing needs, utilizing the 
cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., 
bandwidth) is an important issue when trying to minimize costs. The cloud customers, applying a 
judicious use of the cloud’s resources, are motivated to use various traffic reduction techniques, 
in particular traffic redundancy elimination (TRE), for reducing bandwidth costs.
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
Traffic redundancy stems from common end-users’ activities, such as repeatedly 
accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar 
information items (documents, data, Web, and video). TRE is used to eliminate the transmission 
of redundant content and, therefore, to significantly reduce the network cost. In most common 
TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, 
parsed according to the data content, prior to their transmission. When redundant chunks are 
detected, the sender replaces the transmission of each redundant chunk with its strong signature. 
Commercial TRE solutions are popular at enterprise networks, and involve the deployment of 
two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry 
points of data centers and branch offices, eliminating repetitive traffic between them. 
We present a novel receiver-based end-to-end TRE solution that relies on the power of 
predictions to eliminate redundant traffic between the cloud and its end-users. 
EXISTING SYSTEM: 
Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, 
downloading, uploading (i.e., backup), distributing, and modifying the same or similar 
information items (documents, data, Web, and video). TRE is used to eliminate the transmission 
of redundant content and, therefore, to significantly reduce the network cost. In most common 
TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, 
parsed according to the data content, prior to their transmission. When redundant chunks are 
detected, the sender replaces the transmission of each redundant chunk with its strong signature. 
Commercial TRE solutions are popular at enterprise networks, and involve the deployment of 
two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry 
points of data centers. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. Cloud providers cannot benefit from a technology whose goal is to reduce customer 
bandwidth bills, and thus are not likely to invest in one. 
2. The rise of “on-demand” work spaces, meeting rooms, and work- from-home solutions 
detaches the workers from their offices. In such a dynamic work environment, fixed-point 
solutions that require a client-side and a server-side middle-box pair become ineffective. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
3. cloud load balancing and power optimizations may lead to a server-side process and data 
migration environment, in which TRE solutions that require full synchronization between the 
server and the client are hard to accomplish or may lose efficiency due to lost synchronization 
4. Current end-to-end solutions also suffer from the requirement to maintain end-to-end 
synchronization that may result in degraded TRE efficiency. 
In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power 
of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, 
each receiver observes the incoming stream and tries to match its chunks with a previously 
received chunk chain or a chunk chain of a local file. Using the long-term chunks’ metadata 
information kept locally, the receiver sends to the server predictions that include chunks’ 
signatures and easy-to-verify hints of the sender’s future data. O n the receiver side, we propose a 
new computationally lightweight chunking (fingerprinting) scheme termed PACK chunking. 
PACK chunking is a new alternative for Rabin fingerprinting traditionally used by RE 
applications. 
ADVANTAGES OF PROPOSED SYSTEM: 
1. Our approach can reach data processing speeds over3 Gb/s, at least 20% faster than Rabin 
fingerprinting. 
2. The receiver-based TRE solution addresses mobility problems common to quasi-mobile 
desktop/ laptops computational environments. 
3. One of them is cloud elasticity due to which the servers are dynamically relocated around the 
federated cloud, thus causing clients to interact with multiple changing servers. 
4. We implemented, tested, and performed realistic experiments with PACK within a cloud 
environment. Our experiments demonstrate a cloud cost reduction achieved at a reasonable client 
effort while gaining additional bandwidth savings at the client side. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
5. Our implementation utilizes the TCP Options field, supporting all TCP-based applications 
such as Web, video streaming, P2P, e-mail, etc. 
6. We demonstrate that our solution achieves 30% redundancy elimination without significantly 
affecting the computational effort of the sender, resulting in a 20% reduction of the overall cost 
to the cloud customer. 
SYSTEM ARCHITECTURE: 
Fig. 1. From stream to chain. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
Figure 2- Overview of the PACK implementation. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
MODULES: 
 Receiver Chunk Store 
 Receiver Algorithm 
 Sender Algorithm 
 Wire Protocol 
MODULES DESCRIPTION: 
Receiver Chunk Store 
PACK uses a new chains scheme. which chunks are linked to other chunks according to 
their last received order. The PACK receiver maintains a chunk store, which is a large size cache 
of chunks and their associated metadata. Chunk’s metadata includes the chunk’s signature and a 
(single) pointer to the successive chunk in the last received stream containing this chunk. 
Caching and indexing techniques are employed to efficiently maintain and retrieve the stored 
chunks, their signatures, and the chains formed by traversing the chunk pointers. 
When the new data are received and parsed to chunks, the receiver computes each 
chunk’s signature using SHA-1. At this point, the chunk and its signature are added to the chunk
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
store. In addition, the metadata of the previously received chunk in the same stream is updated to 
point to the current chunk. The unsynchronized nature of PACK allows the receiver to map each 
existing file in the local file system to a chain of chunks, saving in the chunk store only the 
metadata associated with the chunks. 
Receiver Algorithm 
Upon the arrival of new data, the receiver computes the respective signature for each 
chunk and looks for a match in its local chunk store. If the chunk’s signature is found, the 
receiver determines whether it is a part of a formerly received chain, using the chunks’ metadata. 
If affirmative, the receiver sends a prediction to the sender for several next expected chain 
chunks. Upon a successful prediction, the sender responds with a PRED-ACK confirmation 
message. Once the PRED-ACK message is received and processed, the receiver copies the 
corresponding data from the chunk store to its TCP input buffers, placing it according to the 
corresponding sequence numbers. At this point, the receiver sends a normal TCP ACK with the 
next expected TCP sequence number. In case the prediction is false, or one or more predicted 
chunks are already sent, the sender continues with normal operation, e.g., sending the raw data, 
without sending a PRED-ACK message. 
Sender Algorithm 
When a sender receives a PRED message from the receiver, it tries to match the received 
predictions to its buffered (yet to be sent) data. For each prediction, the sender determines the 
corresponding TCP sequence range and verifies the hint. Upon a hint match, the sender 
calculates the more computationally intensive SHA-1 signature for the predicted data range and 
compares the result to the signature received in the PRED message. Note that in case the hint 
does not match, a computationally expansive operation is saved. If the two SHA-1 signatures 
match, the sender can safely assume that the receiver’s prediction is correct. In this case, it 
replaces the corresponding outgoing buffered data with a PRED-ACK message. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 
The existing firewalls and minimizes overheads; we use the TCP Options field to carry 
the PACK wire protocol. It is clear that PACK can also be implemented above the TCP level 
while using similar message types and control fields. The PACK wire protocol operates under 
the assumption that the data is redundant. First, both sides enable the PACK option during the 
initial TCP handshake by adding a PACK permitted to the TCP Options field. Then, the sender 
sends the (redundant) data in one or more TCP segments, and the receiver identifies that a 
currently received chunk is identical to a chunk in its chunk store. The receiver, in turn, triggers a 
TCP ACK message and includes the prediction in the packet’s Options field. Last, the sender 
sends a confirmation message (PRED-ACK) replacing the actual data. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa “Privacy- 
Enhanced Web Service Composition”- IEEE TRANSACTIONS ON SERVICES 
COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2014 
Contact: 9703109334, 9533694296 
Wire Protocol 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

Weitere ähnliche Inhalte

Was ist angesagt?

sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankur
Ankur Yogi
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
Shakas Technologies
 

Was ist angesagt? (16)

ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Prediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and CostPrediction System for Reducing the Cloud Bandwidth and Cost
Prediction System for Reducing the Cloud Bandwidth and Cost
 
Spy x tchnology
Spy x tchnologySpy x tchnology
Spy x tchnology
 
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degreeThe UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
 
sky x ppt ankur
sky x ppt ankursky x ppt ankur
sky x ppt ankur
 
Scalable analytics for iaas cloud availability
Scalable analytics for iaas cloud availabilityScalable analytics for iaas cloud availability
Scalable analytics for iaas cloud availability
 
Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...
 
Sky x technology
Sky x technologySky x technology
Sky x technology
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
 
Paper id 41201624
Paper id 41201624Paper id 41201624
Paper id 41201624
 
On network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudOn network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloud
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
cost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodescost effective resource allocation of overlay routing relay nodes
cost effective resource allocation of overlay routing relay nodes
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
A046020112
A046020112A046020112
A046020112
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 

Ähnlich wie pack prediction-based cloud bandwidth and cost reduction system

Ähnlich wie pack prediction-based cloud bandwidth and cost reduction system (20)

JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 

Mehr von swathi78

Mehr von swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 

Kürzlich hochgeladen

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Kürzlich hochgeladen (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

pack prediction-based cloud bandwidth and cost reduction system

  • 1. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System PACK Prediction-Based Cloud Bandwidth and Cost Reduction System In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK’s main advantage is its capability of offloading the cloud-server TRE effort to end clients, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients’ status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. PACK is based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. We present a fully functional PACK implementation, transparent to all TCP-based applications and network devices. Finally, we analyze PACK benefits for cloud users, using traffic traces from various sources. Contact: 9703109334, 9533694296 ABSTRACT: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in AIM: The main aim of this project is PACK based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. SYNOPSIS: Cloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing. Cloud customers1 pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important issue when trying to minimize costs. The cloud customers, applying a judicious use of the cloud’s resources, are motivated to use various traffic reduction techniques, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs.
  • 2. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly reduce the network cost. In most common TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, parsed according to the data content, prior to their transmission. When redundant chunks are detected, the sender replaces the transmission of each redundant chunk with its strong signature. Commercial TRE solutions are popular at enterprise networks, and involve the deployment of two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry points of data centers and branch offices, eliminating repetitive traffic between them. We present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. EXISTING SYSTEM: Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly reduce the network cost. In most common TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, parsed according to the data content, prior to their transmission. When redundant chunks are detected, the sender replaces the transmission of each redundant chunk with its strong signature. Commercial TRE solutions are popular at enterprise networks, and involve the deployment of two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry points of data centers. DISADVANTAGES OF EXISTING SYSTEM: 1. Cloud providers cannot benefit from a technology whose goal is to reduce customer bandwidth bills, and thus are not likely to invest in one. 2. The rise of “on-demand” work spaces, meeting rooms, and work- from-home solutions detaches the workers from their offices. In such a dynamic work environment, fixed-point solutions that require a client-side and a server-side middle-box pair become ineffective. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 3. cloud load balancing and power optimizations may lead to a server-side process and data migration environment, in which TRE solutions that require full synchronization between the server and the client are hard to accomplish or may lose efficiency due to lost synchronization 4. Current end-to-end solutions also suffer from the requirement to maintain end-to-end synchronization that may result in degraded TRE efficiency. In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its chunks with a previously received chunk chain or a chunk chain of a local file. Using the long-term chunks’ metadata information kept locally, the receiver sends to the server predictions that include chunks’ signatures and easy-to-verify hints of the sender’s future data. O n the receiver side, we propose a new computationally lightweight chunking (fingerprinting) scheme termed PACK chunking. PACK chunking is a new alternative for Rabin fingerprinting traditionally used by RE applications. ADVANTAGES OF PROPOSED SYSTEM: 1. Our approach can reach data processing speeds over3 Gb/s, at least 20% faster than Rabin fingerprinting. 2. The receiver-based TRE solution addresses mobility problems common to quasi-mobile desktop/ laptops computational environments. 3. One of them is cloud elasticity due to which the servers are dynamically relocated around the federated cloud, thus causing clients to interact with multiple changing servers. 4. We implemented, tested, and performed realistic experiments with PACK within a cloud environment. Our experiments demonstrate a cloud cost reduction achieved at a reasonable client effort while gaining additional bandwidth savings at the client side. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 5. Our implementation utilizes the TCP Options field, supporting all TCP-based applications such as Web, video streaming, P2P, e-mail, etc. 6. We demonstrate that our solution achieves 30% redundancy elimination without significantly affecting the computational effort of the sender, resulting in a 20% reduction of the overall cost to the cloud customer. SYSTEM ARCHITECTURE: Fig. 1. From stream to chain. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 5. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System Figure 2- Overview of the PACK implementation. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in MODULES:  Receiver Chunk Store  Receiver Algorithm  Sender Algorithm  Wire Protocol MODULES DESCRIPTION: Receiver Chunk Store PACK uses a new chains scheme. which chunks are linked to other chunks according to their last received order. The PACK receiver maintains a chunk store, which is a large size cache of chunks and their associated metadata. Chunk’s metadata includes the chunk’s signature and a (single) pointer to the successive chunk in the last received stream containing this chunk. Caching and indexing techniques are employed to efficiently maintain and retrieve the stored chunks, their signatures, and the chains formed by traversing the chunk pointers. When the new data are received and parsed to chunks, the receiver computes each chunk’s signature using SHA-1. At this point, the chunk and its signature are added to the chunk
  • 6. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System store. In addition, the metadata of the previously received chunk in the same stream is updated to point to the current chunk. The unsynchronized nature of PACK allows the receiver to map each existing file in the local file system to a chain of chunks, saving in the chunk store only the metadata associated with the chunks. Receiver Algorithm Upon the arrival of new data, the receiver computes the respective signature for each chunk and looks for a match in its local chunk store. If the chunk’s signature is found, the receiver determines whether it is a part of a formerly received chain, using the chunks’ metadata. If affirmative, the receiver sends a prediction to the sender for several next expected chain chunks. Upon a successful prediction, the sender responds with a PRED-ACK confirmation message. Once the PRED-ACK message is received and processed, the receiver copies the corresponding data from the chunk store to its TCP input buffers, placing it according to the corresponding sequence numbers. At this point, the receiver sends a normal TCP ACK with the next expected TCP sequence number. In case the prediction is false, or one or more predicted chunks are already sent, the sender continues with normal operation, e.g., sending the raw data, without sending a PRED-ACK message. Sender Algorithm When a sender receives a PRED message from the receiver, it tries to match the received predictions to its buffered (yet to be sent) data. For each prediction, the sender determines the corresponding TCP sequence range and verifies the hint. Upon a hint match, the sender calculates the more computationally intensive SHA-1 signature for the predicted data range and compares the result to the signature received in the PRED message. Note that in case the hint does not match, a computationally expansive operation is saved. If the two SHA-1 signatures match, the sender can safely assume that the receiver’s prediction is correct. In this case, it replaces the corresponding outgoing buffered data with a PRED-ACK message. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 7. PACK Prediction-Based Cloud Bandwidth and Cost Reduction System The existing firewalls and minimizes overheads; we use the TCP Options field to carry the PACK wire protocol. It is clear that PACK can also be implemented above the TCP level while using similar message types and control fields. The PACK wire protocol operates under the assumption that the data is redundant. First, both sides enable the PACK option during the initial TCP handshake by adding a PACK permitted to the TCP Options field. Then, the sender sends the (redundant) data in one or more TCP segments, and the receiver identifies that a currently received chunk is identical to a chunk in its chunk store. The receiver, in turn, triggers a TCP ACK message and includes the prediction in the packet’s Options field. Last, the sender sends a confirmation message (PRED-ACK) replacing the actual data. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa “Privacy- Enhanced Web Service Composition”- IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2014 Contact: 9703109334, 9533694296 Wire Protocol REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in