An Extensive Survey over Traffic Management/Load Balance in Cloud Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
Cloud Computing (CC) is all about carrying out processing in other's system. There are various vendors who provide CC services. The basic algorithm that should be met to access CC services is a need for steady internet connection. As everything is done online the traffic across the internet is to be managed efficiently so that the transmission delay can be minimized and better quality of service can be given to the customers. The network should not be too congested at any moment of time. Hence the traffic management becomes a crucial factor for the better performance of the CC network. This paper addressed the most valuable terms and topics concerning the load balance/traffic management in cloud computing. Also, the paper is meant to discuss the study analysis of the recent researches in load balance of CC. From the study analysis the current research gap is addressed with a future scope of research to overcome the research gap.
Authors and Affiliations
Amith Shekhar C, Sharvani G S
Wireless Sensor Networks for Road Traffic Monitoring
Wireless Sensor Networks (WSNs) consist of large number of sensor nodes. Each node is empowered by a com-munication interface that is mainly characterized by low power, short transmission distance and minimal data rate s...
Using an Integrated Framework for Conceptual Modeling
The Integrated Framework for Conceptual Modeling (IFCMod) is created to contribute to the quality of the information system through the integration of the functional and non-functional requirements. This paper attempts t...
Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms
This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. Three new level of categorizations, including low, high, and...
Detecting and Classifying Crimes from Arabic Twitter Posts using Text Mining Techniques
Crime analysis has become a critical area for helping law enforcement agencies to protect civilians. As a result of a rapidly increasing population, crime rates have increased dramatically, and appropriate analysis has b...
ON THE PRACTICAL FEASIBILITY OF SECURE MULTIPATH COMMUNICATION
Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption. Since this form of secret communication works wi...