Development of Virtual Computing Lab Using Private Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Virtual Computing Lab (VCL) is a very effective answer for the educational institution to meet the increasing demand of physical machines, different computational laboratories and large number of users in alimited budget and time. Cloud computing (‘on demand computing’) is a revolutionary technology that has taken the world by storm. A small private cloud built in our college intranet can help us to harness the advantages of cloud in educational field. Building a VCL using the private cloud can satisfy the requirements of our college’s increasing set of computational need and user requirement. This VCL provides a flexible way to provide services through Virtual Machine (VM). It also provides versatility, security and cost effectiveness which was not possible in physical workstation model of laboratories. The private cloud developed can provide a variety of OS environment helping the instructors in development of courses and strengthening curriculum. Students and teachers will be able to experience and feel variety of OS on a single desktop and understand its processing. In this paper we use EUCALYPTUS – an open source software framework for cloud computing for developing a VCL that provides Infrastructure as a Service (IaaS).
Authors and Affiliations
Devendra Panda , Abhishek Sharma , Akshay Patil , Mahesh Tripathi , Neeraj Khairwal
Virtual Energy Based Encryption & Keying on Wireless Sensor Network
: Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this we introdu...
Structural Analysis of RF Architecture using Crossbar Type Topology for Cryptographic Application
Abstract: The strongly emerging class, Coarse-Grained Re-configurable Architecture (CGRA) is currently receiving attention and also having excellent performance with flexibility in fabrication. An entire range of compone...
Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing
[i]In this paper, we propose an survey on heterogeneous wireless sensor network (HWSN) and how the efficiency and redundancy management is exploit in the various methods .Here timeliness and security are main concern to...
SSL-QA: Analysis of Semi-Supervised Learning for QuestionAnswering
Open domain natural language question answering (QA) is a process of automatically finding answers to questions searching collections of text files. Question answering (QA) is a long-standing challenge in NLP, and the co...
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate messagefrom u...