HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Cloud computing is a paradigm in which IT (information technology) application provide as a service. It allows users to utilize on-demand computation over internet, which is helpful for storage of data and services from around the world in commercialize manner. In cloud environment, applications need access to mass datasets that may each be replicated on different resources (or data centers) and Mass data moving from user to host and hosts to user. Based on the above two points, how to select best host for accessing resources and creating a virtual machine(VM) to execute applications to make execution efficiency high and access cost low as far as possible simultaneously is a challenging and urgent problem. In this paper, a host selection model based on minimum network delay using WSCP combined with Max-Min Heuristic. To select the host and schedule multiple jobs on multiple machines in an efficient manner is proposed, the objective is to minimize propagation time of input and output data by selecting nearest host into the network and finally it minimize the execution time of cloudlet.
Authors and Affiliations
Pawan Kumar, , Pijush Kanti Dutta Pramanik
Security Analysis of Fair E-cash Payment System
In e-commerce, e-payment is one of the most essential research areas. Properly combining the payment protocol with a fair exchange procedure, the payment system allows the consumer and the merchant to fairly exchan...
Enhancing Route Quality In MANET Using Linear Optimization
Mobile ad-hoc network is a constantly changing wireless network of autonomous nodes which communicate without the aid of any base station by routing the packets through intermediate nodes. As the nodes are mobile...
Promulgate: an approach to Optimize the data transfer in Service Oriented Architecture
The main potential benefit of Service-oriented architecture (SOA) is applying across multiple solution environments based on the request and reply paradigm. Service-oriented architecture integrates both enterprise...
A Survey on Intrusion Detection System in Data Mining
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Ne...
Design and Implementation of Floating Point Multiplier for Better Timing Performance
IEEE Standard 754 floating point is the most common representation today for real numbers on computers. This paper gives a brief overview of IEEE floating point and its representation. This paper describes a sing...