An Effective Cloud Service Reservation Through Negotiation
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1
Abstract
When making reservations for Cloud services, the consumer should provide with price and time slot for the service. The provider gives the price and time slot which are available, then the particular service will be provided to the user by negotiation of both price and time. Since there is a negotiation on price and time slot, the requested service may be unavailable. So, consumers can give multiple proposals for a service. After the reservation is done the job is monitored to get the QoS violations. When there is a malfunction certain actions will be carried out for the remedy like requesting for resources if necessary. To get a highest possible QoS assurance the negotiation uses a trade off algorithm which makes available of the resources to the services requested. When the task done by the consumer is over before the reserved time the QoS can’t be obtained effectively because of the idle state. So the resource will be given to other consumer to be utilized which improves the QoS of the Cloud service reservations.
Authors and Affiliations
Praveen. K , Sudhakar. K
Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks
Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...
Performance Enhancement of a Novel Interleaved Boost Converter by using a Soft-Switching Technique
In this paper a novel Interleaved Boost Converter (IBC) with soft-switching techniques is proposed. Through the zero-voltage switching (ZVS) and zero-current switching (ZCS) reduces the current stress of the main circuit...
To Improve Data Security by Using Secure Data Transmission
The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Al...
A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
Cyber attack detection and classification is major challenge for web and network security. The increasing data traffic in network and web invites multiple cyber attack. The dynamic nature and large number of attribute of...
Private Grid Environment for Personal Users
The overall aim of this paper is to introduce the Private grid environment (PvGrid) as a ubiquitous grid environment that is not only owned and utilized by personal users but also deployed over their own devices. In this...