Vigorous Data Provision And Organization By Using Gossip Protocol
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Resource management poses particular challenges in large-scale systems, such as server clusters that simultaneously process requests from a large number of clients. We mainly focus on the dynamic resource management in large scale cloud environment. clouds dynamically scales and adapts both number of physical machines and allocation to the load changes. We first present a protocol that maximizes the cloud utility under CPU and memory constraints and also minimizes the cost for adapting an allocation. Then, we extend that protocol to have a management control parameter, which can be done with the help of profiling technique. we extend that protocol to provide an efficient heuristic solution for the complete problem, which includes minimizing the cost for adapting an allocation. The protocol continuously executes on dynamic, local input and does not require global synchronization, as other proposed gossip protocols do.
Authors and Affiliations
Chinigi Praveena, S Babu
Automatic Membership Service For Large-Scale Dependable Storage Systems
Byzantine-fault-tolerant replication increases the reliability and availability of Internet services that store significant state and protect it in spite of attacks or software errors. Existing Byzantine-fault-toleran...
Design And Implementation of CMOS Adder Cell With Reduced Leakage Power Technique In 90nm Technology
Now-a-days Power consumption (or) power dissipation has becomes the most important criteria for implementing anyone of the digital circuit. While calculating the efficient value of the output of that particular digit...
Comparative Study of Hand Gesture Recognition Algorithms
Gesture recognition is the technique which is employed for the interaction between human and computer or any auto. In this paper, different types of gesture recognition algorithm is being proposed. Hand detection and...
An Approach to Identify Node Clones in Wireless Sensor Networks
Sensor nodes that are deployed in hostile environments are susceptible to capture and compromise. An adversary may gain private information from these sensors, clone and logically deploy them in the network to launch...
Data Protection and Malicious Insiders Detection in Cloud
Cloud computing presents a huge data services to the user in an easy and comfortable way over the existing network. The main feature of the cloud service is that the data shared by the users are processed remotely wit...