Optimizing Resource Allocation in IAAS Clouds
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS). The IaaS allows cloud users to access resources in pay per use fashion. The problem with this service model in the existing solutions is that the cloud provider may either overprovision the resources or not in a position to serve large number of requests. At any given time, all users might not need on-demand access. Keeping this in mind a strategy is required in order to optimize resource allocation. Many applications exists that take care of high-throughput computing (HTC) where more resources are expected to be allocated. For instance Condor is such application that assigns available resource to jobs and then the resources are released once job is completed. Recently Marshall et al. proposed cloud infrastructure that has provision for on-demand allocation of resources using backfill virtual machines. For this purpose Nimbus is used. In this paper we have implemented the concept of optimal resource allocation using the notion of HTC users and on-demand users. We built a prototype application that demonstrates the proof of concept. The empirical results are encouraging.
Authors and Affiliations
Y. Rajesh Kumar , K. Sirisha
Cyclic Sensing MAC Protocol for Multicast Routing in Mobile Ad-Hoc Networks
In Ad Hoc networks realizing high throughput is achievable when directional antennas are utilized. The directional antennas lead to higher spatial multiplexing gain. On The Other Hand, there are a few issues in practice...
Maximizing Network Capacity in MANETs through Cooperative Communications
Mobile Ad Hoc Networks are for many practical scenarios in the real world as it does not need any pre-established infrastructure. Nodes in the MANET are resource constrained. Communications over network consume energy re...
Survey on Security Issues and Solutions in Cloud Computing
Cloud computing is a combination of several key technologies that have evolved and matured over the years. Cloud computing has a potential for cost savings to the enterprises but the security risk are also enormous. Clou...
A Review of Cyber Attack Classification Technique Based on Data Mining and Neural Network Approach
Cyber attack detection and classification is major challenge for web and network security. The increasing data traffic in network and web invites multiple cyber attack. The dynamic nature and large number of attribute of...
An Effort Prediction Framework for Software Code Quality Measurement Based on Quantifiable Constructs for Object Oriented Design
As the Object Oriented Technology enters into software organizations, it has created new challenges for the companies which used only Product Metrics as a tool for monitoring, controlling and maintaining the software pro...