An Efficient Multiple Request Resource Allocation in Cloud Environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
A cloud environment is the popular shareable computing environments where large number of clients/users are connected to the common cloud computing environment to access the resources and the services. The presented work is focused on the concept of effective resource allocation, de-allocation and reallocation in a cloud environment. To present the concept, we have taken a cloud environment with multiple clouds along with multiple virtual machines. The machines used in our work are all of same types i.e., homogenous machines. These all clouds are assigned by a specific priority. Now as the user request arrive, it performs the request to the priority cloud under its requirements in terms of memory & processor capabilities. When the client stops the task then the service allocated to the client is released & same can be reallocated to another client in the waiting. The client can deallocate all or some specific resources according to requirements. After deallocation the client can further allocate the resources. Hence the work provides efficient allocation, de-allocation and reallocation of cloud services.
Authors and Affiliations
Priya Beniwal, Anil Arora
slugAn Approach towards Link Positions Routing In Wireless Network
Here, we account for the fact that MAC protocols incorporate a finite number of transmission attempts per packet. The performance of a path depends not only on the number of the links on the path and the quality of its l...
Data Mining In E-Money and Its Security
No doubt, our modern society is gradually catching the cashless syndrome. E-payments, ATM cards and others are now the order of the day at our work-places. This paper takes a keen look into the feasibility of introducin...
An Ensemble Model for Identification of Phishing Website
Identification of phishing websites is very challenging task for every internet and e-mail users. To protect the information from unauthorized person classification of phishing websites is very important. In this resear...
Enhanced Clustering Technique to Find Replica Nodes in WSN
Sensor networks are highly distributed networks of small, lightweight wireless nodes, deployed in hundreds of thousands to monitor the environment or system by the measurement of physical parameters such as temperature,...
Foreign Banks operating in India with specific business practices models and their Scenario Post RBI Road Map 2005
During the last two decades, India has seen an unprecedented degree of globalization especially in financial services. At present the cross border financial flows have increased dramatically. Many foreign banks from bot...