Multideployment and Multisnapshotting on IAAS Cloud Environments
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 5
Abstract
Infrastructure as a Service (IaaS) cloud computing has revolutionized the way we think of acquiring resources by introducing a simple change: allowing users to lease computational resources from the cloud provider’s datacenter for a short time by deploying virtual machines (VMs) on these resources. This new model raises new challenges is the need to deploy a large number (hundreds or even thousands) of VM instances simultaneously. Once the VM instances are deployed, another challenge is to simultaneously take a snapshot of many images and transfer them to persistent storage to support management tasks, such as suspend-resume and migration. With datacenters growing rapidly and configurations becoming heterogeneous, it is important to enable efficient concurrent deployment and snapshotting that are at the same time hypervisor independent and ensure a maximum compatibility with different configurations. This paper addresses these challenges by proposing a virtual file system specifically optimized for virtual machine image storage. It is based on a lazy transfer scheme coupled with object versioning that handles snapshotting transparently in a hypervisor- independent fashion, ensuring high portability for different configurations
Authors and Affiliations
D. Amulya
Study and Analysis of Knowledge Representation methods in Expert System
During the quarter century since the birth of the branch of computer science known as artificial intelligence (Al), much of the research has focused on developing symbolic models of human inference. In the last decade se...
Optimization of Truck Chassis for Frequency Response
FE analysis provides an optimal and quick way to optimize the structural design of any vehicle. When considering the structural design of a vehicle, chassis design plays an important role for all the parts are attached t...
A Smart dust network system for monitoring Enemy’s Intrusion using Camera-Acoustic-Magnetic-Thermal- Vibration Signatures
The greatest threat to national security is “Terrorism” infiltrating through borders. In critical border areas such as Kashmir and Bangladesh regular forces or even satellites cannot monitor these intruding terrorists as...
Characterization of Fuelwood Species in the Guinea Savanna Ecological Zone of Ghana
Indigenous plant species from the guinea savanna ecological zone are an important biomass source. However, their fuel characteristics and the mineral concentrations are less studied. The present study investigated the fu...
Exploration Encryption Mechanism Using Single Key for Public Cloud Storage
Sharing of Data is an main functionality in cloud Computing. In this system, we show how to share data in securely, flexibly, efficiently, and with others in cloud computing. Cloud storage is a bulk of information online...