Enviar pesquisa
Carregar
484 488
•
0 gostou
•
209 visualizações
E
Editor IJARCET
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 5
Baixar agora
Baixar para ler offline
Recomendados
119 125
119 125
Editor IJARCET
Cloud Technology_Concepts
Cloud Technology_Concepts
eGuvernare_Moldova
Cloud computing for enterprise
Cloud computing for enterprise
Pravin Asar
Business implementation of Cloud Computing
Business implementation of Cloud Computing
Quaid Sodawala
Cloud computing
Cloud computing
Tarvinder Singh
Cloud computing seminar report
Cloud computing seminar report
shafzonly
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
The seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
Recomendados
119 125
119 125
Editor IJARCET
Cloud Technology_Concepts
Cloud Technology_Concepts
eGuvernare_Moldova
Cloud computing for enterprise
Cloud computing for enterprise
Pravin Asar
Business implementation of Cloud Computing
Business implementation of Cloud Computing
Quaid Sodawala
Cloud computing
Cloud computing
Tarvinder Singh
Cloud computing seminar report
Cloud computing seminar report
shafzonly
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...
Sushil kumar Choudhary
The seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
Group seminar report on cloud computing
Group seminar report on cloud computing
Sandhya Rathi
Cloud computing
Cloud computing
Jawhar Ali
Cloud computing report
Cloud computing report
Vamsi Krishna Vanama
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
cloud computing documentation
cloud computing documentation
shilpa bojji
Vendor classification & rating
Vendor classification & rating
Amit Puri
Cloud computing
Cloud computing
ABDALLA SAID
Cloud computing
Cloud computing
ABDALLA SAID
Cyber forensics in cloud computing
Cyber forensics in cloud computing
Alexander Decker
Aj04602248254
Aj04602248254
IJERA Editor
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
Faimin Khan
IJSRED-V1I1P1
IJSRED-V1I1P1
IJSRED
Cloud Computing
Cloud Computing
Mahindra Satyam
Report on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
Prashant Gupta
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
Govt. P.G. College Dharamshala
121 124
121 124
Ijarcsee Journal
Weekend conference organization - brief example
Weekend conference organization - brief example
Sergio Stanga Romero
Les Pasen
Les Pasen
eennieuwbegin
Cultivation envite
Cultivation envite
cbasinais
Nets 1
Nets 1
Amychamp
Mais conteúdo relacionado
Mais procurados
Group seminar report on cloud computing
Group seminar report on cloud computing
Sandhya Rathi
Cloud computing
Cloud computing
Jawhar Ali
Cloud computing report
Cloud computing report
Vamsi Krishna Vanama
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
cloud computing documentation
cloud computing documentation
shilpa bojji
Vendor classification & rating
Vendor classification & rating
Amit Puri
Cloud computing
Cloud computing
ABDALLA SAID
Cloud computing
Cloud computing
ABDALLA SAID
Cyber forensics in cloud computing
Cyber forensics in cloud computing
Alexander Decker
Aj04602248254
Aj04602248254
IJERA Editor
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
Faimin Khan
IJSRED-V1I1P1
IJSRED-V1I1P1
IJSRED
Cloud Computing
Cloud Computing
Mahindra Satyam
Report on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
Prashant Gupta
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
Govt. P.G. College Dharamshala
121 124
121 124
Ijarcsee Journal
Mais procurados
(18)
Group seminar report on cloud computing
Group seminar report on cloud computing
Cloud computing
Cloud computing
Cloud computing report
Cloud computing report
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
Cloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
cloud computing documentation
cloud computing documentation
Vendor classification & rating
Vendor classification & rating
Cloud computing
Cloud computing
Cloud computing
Cloud computing
Cyber forensics in cloud computing
Cyber forensics in cloud computing
Aj04602248254
Aj04602248254
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
IJSRED-V1I1P1
IJSRED-V1I1P1
Cloud Computing
Cloud Computing
Report on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
121 124
121 124
Destaque
Weekend conference organization - brief example
Weekend conference organization - brief example
Sergio Stanga Romero
Les Pasen
Les Pasen
eennieuwbegin
Cultivation envite
Cultivation envite
cbasinais
Nets 1
Nets 1
Amychamp
Paris la nuit
Paris la nuit
gloria
The Benefits Of Thermography Kiosk
The Benefits Of Thermography Kiosk
SalemORHomeInspector
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
pamimargon
Guia. Primer Formato, TamañO
Guia. Primer Formato, TamañO
guest97aa6b6
Collecting Knowledge
Collecting Knowledge
Nancy Stuewe
Using Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy Efficiency
Cliff Majersik
first conditional
first conditional
Anna Tombas
Agenda
Agenda
Toupeiro Toupeira
Administrador De Empresas
Administrador De Empresas
guest8d27ec
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Editor IJARCET
Presentazione
Presentazione
iago3
donald
donald
sara3marta
Learner Profile
Learner Profile
guest246440
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340
Editor IJARCET
Kurume_1
Kurume_1
公益法人福岡貿易会
profesiones cinematográficas
profesiones cinematográficas
evapayasa
Destaque
(20)
Weekend conference organization - brief example
Weekend conference organization - brief example
Les Pasen
Les Pasen
Cultivation envite
Cultivation envite
Nets 1
Nets 1
Paris la nuit
Paris la nuit
The Benefits Of Thermography Kiosk
The Benefits Of Thermography Kiosk
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
Guia. Primer Formato, TamañO
Guia. Primer Formato, TamañO
Collecting Knowledge
Collecting Knowledge
Using Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy Efficiency
first conditional
first conditional
Agenda
Agenda
Administrador De Empresas
Administrador De Empresas
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Presentazione
Presentazione
donald
donald
Learner Profile
Learner Profile
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340
Kurume_1
Kurume_1
profesiones cinematográficas
profesiones cinematográficas
Semelhante a 484 488
119 125
119 125
Editor IJARCET
G017324043
G017324043
IOSR Journals
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
Alexander Decker
P18 2 8-5
P18 2 8-5
anveshmudumbi
Cloud computing applicatio
Cloud computing applicatio
Chetan Sontakke
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
Cloud Computing
Cloud Computing
Rishu Mehra
Cloud Computing
Cloud Computing
Sandeep Singh
Cloud computing
Cloud computing
Manpreet Kaur
Cloud computing 1
Cloud computing 1
Sagar Kumar
Cloud computing
Cloud computing
Vijay Kumar
Virtualization in cloud computing
Virtualization in cloud computing
Mehul Patel
Cloud computing writeup
Cloud computing writeup
selvavijay1987
akashgupta(2).pptx
akashgupta(2).pptx
SiddhantPandey67
51 59
51 59
Editor IJARCET
51 59
51 59
Editor IJARCET
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Vivek Maurya
Cloud computing
Cloud computing
sandita12
Cloud computing
Cloud computing
karthiklreddy
Semelhante a 484 488
(20)
119 125
119 125
G017324043
G017324043
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
P18 2 8-5
P18 2 8-5
Cloud computing applicatio
Cloud computing applicatio
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
Cloud Computing
Cloud Computing
Cloud Computing
Cloud Computing
Cloud computing
Cloud computing
Cloud computing 1
Cloud computing 1
Cloud computing
Cloud computing
Virtualization in cloud computing
Virtualization in cloud computing
Cloud computing writeup
Cloud computing writeup
akashgupta(2).pptx
akashgupta(2).pptx
51 59
51 59
51 59
51 59
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud computing
Cloud computing
Cloud computing
Cloud computing
Mais de Editor IJARCET
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
Mais de Editor IJARCET
(20)
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Último
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
mohitsingh558521
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Último
(20)
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
484 488
1.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI , Matunga, Mumbai, India, E-mail:harshagzb89@gmail.com. and mobile apps, while the business software and data Abstract –Cloud computing ,now- a- days is a trend in the IT industry.We normally deploy cloud based infrastructure, are stored on servers at a remote location. In some applications on Bare-metal hardware. But still the resource cases, legacy applications (line of business utilization is not at its maximum .There is still some amount of applications that until now have been prevalent in thin room for addition of more applications, etc..to utilize resources client Windows computing) are delivered via a screen- to their max. Now, since cloud is already virtualized, we further sharing technology, while the computing resources are virtualize the cloud using Virtualization Software.The resources consolidated at a remote data center location. At the may be CPU,Memory,etc..Virtualization of cloud enables us to foundation of cloud computing is the broader concept run multiple clouds on a single physical machine. That makes of infrastructure convergence (or Converged resource utilization, the maximum. This paper shows how to use Infrastructure) and shared services. This type of data the resources optimally by deploying multiple clouds on a single physical machine. center environment allows enterprises to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to Кеу words –Cloud Computing,Virtualization,Resources. more rapidly adjust IT resources (such as servers, storage, and networking) to meet fluctuating and unpredictable business demand. I. Introduction Most cloud computing infrastructures consist of During the last ten years, mobile handheld devices have services delivered through shared data-centers and become a part of our everyday lives. Cloud Computing is appearing as a single point of access for consumers' easily defined as “Anything that is provided as a computing needs. Commercial offerings may be Service”.Cloud computing is the delivery of computing required to meet service-level agreements (SLAs), but resources as a service rather than a product, whereby shared specific terms are less often negotiated by smaller resources, software, and information are provided to companies.The tremendous impact of cloud computers and other devices as a utility (like the electricity computing on business has prompted the federal grid) over a network (typically the Internet).Cloud computing United States government to look to the cloud as a is a marketing term for technologies that provide means to reorganize their IT infrastructure and computation, software, data access, and storage services that decrease their spending budgets. With the advent of do not require end-user knowledge of the physical location the top government official mandating cloud adoption, and configuration of the system that delivers the services. A many agencies already have at least one or more cloud parallel to this concept can be drawn with the electricity grid, systems online. wherein end-users consume power without needing to understand the component devices or infrastructure required to provide the service. Or similar comparisons can also be II. Cloud Computing done with the bus service we use. We don’t have to buy the bus for our purpose of travelling we just have to pay for the Cloud computing is the delivery of computing as service we use. Cloud computing describes a new a service rather than a product, whereby shared supplement, consumption, and delivery model for IT services resources, software, and information are provided to based on Internet protocols, and it typically involves computers and other devices as a utility (like provisioning of scalable and often virtualized resources. It is the electricity grid) over a network (typically a byproduct and consequence of the ease-of-access to remote the Internet). Cloud computing entrusts, typically computing sites provided by the Internet.This may take the centralized, services with your data, software, and form of web-based tools or applications that users can access computation on a published application programming and use through a web browser as if the programs were installed locally on their own computers. interface (API) over a network. It has a lot of overlap with the software as a service (SaaS).End users access Cloud computing providers deliver applications via the cloud based applications through a web browser or a internet, which are accessed from web browsers and desktop 484 All Rights Reserved © 2012 IJARCET
2.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 light weight desktop or mobile app while the stack typically including operating system, business software and data are stored on servers at a remote programming language execution environment, location. Cloud application providers strive to give the same database, and web server. Application developers can or better service and performance than if the software develop and run their software solutions on a cloud programs were installed locally on end-user computers. platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying Cloud Service Models - Cloud computing providers offer compute and storage resources scale automatically to their services according to three fundamental match application demand such that the cloud user models: Infrastructure as a service (IaaS), platform as a does not have to allocate resources manually. service PaaS), and software as a service (SaaS) where IaaS is the most basic and each higher model abstracts from the details of the lower models. III. Virtualization of Cloud a) Iaas (Infrastructure as a Service)- In this most basic We use VMware Technologies to deploy the cloud service model, cloud providers offer computers – as cloud.Now ,VMware Workstation is used to deploy a physical or more often as virtual machines –, raw (block) private cloud using Ubuntu cloud. When we launch storage, firewalls, load balancer, and networks. IaaS instances from the this cloud,we see that CPU usage is providers supply these resources on demand from their large still 3-4% which is a very less.The CPU usage must pools installed in data centers. Local area networks including hover around 70-80% for maximum utilization.The IP addresses are part of the offer. For the wide area memory usage is also nearing 50%,which should be connectivity, the Internet can be used or - in carrier clouds - 100% for max.So we see that we can actually run dedicated virtual private network can be configured. multiple clouds on a same physical machine to increase resource utilization. To deploy their applications, cloud users then install This can also be called as a “cloud within a cloud” operating system images on the machines as well as their as we are virtualizing the virtualized resources.Inside application software. In this model, it is the cloud user who is the “cloud within the cloud” there are a great number responsible for patching and maintaining the operating of pieces of infrastructure working together. There are systems and application software. Cloud providers typically core networking components i.e. routers, switches, bill IaaS services on a utility computing basis, that is, cost DNS ,DHCP. Connectivity is not possible if these are will reflect the amount of resources allocated and consumed. not present.Moving up the stack we find load In our Cloud based query solver system the service provided balancing and application delivery infrastructure; the to the students is the Iaas and Saas. It provides computer as core application networking components that enable virtual machines to the students and the software given as the the dynamism promised by virtualized environments service is the Query solver interface with the help of which to be achieved. Without a layer of infrastructure the students can ask their queries to their respective Prof. bridging the gap between the network and the applications, virtualized or not, it is difficult to b)Saas (Software as a Service) - In this model, cloud achieve the kind of elasticity and dynamism necessary providers install and operate application software in the cloud for the cloud to “just work” for end users. and cloud users access the software from cloud clients. The It is the application networking layer that is cloud users do not manage the cloud infrastructure and responsible for ensuring availability, proper routing of platform on which the application is running. This eliminates requests, and applying application level policies such the need to install and run the application on the cloud user's as security andacceleration. This layer must be own computers simplifying maintenance and support. What dynamic, because the actual virtualized layers of web makes a cloud application different from other applications is and application servers are themselves dynamic. its elasticity. This can be achieved by cloning tasks onto Application instances may move from IP to IP across multiple virtual machines at run-time to meet the changing hours or days, and it is necessary for the application work demand. Load balancers distribute the work over the set networking layer to be able to adapt to that change of virtual machines. This process is transparent to the cloud without requiring manual intervention in the form of user who sees only a single access point. To accommodate a configuration modification. large number of cloud users, cloud applications can Storage virtualization, too, resides in this layer of be multitenant, that is, any machine serves more than one the infrastructure. Storage virtualization provides cloud user organization. It is common to refer to special types enables a dynamic infrastructure by presenting a of cloud based application software with a similar naming unified view of storage to the applications and internal convention: desktop as a service, business process as a infrastructure, ensuring that the application need not service, Test Environment as a Service, communication as a be modified in order to access file-based resources. service. Storage virtualization can further be the means through which cloud control mechanisms manage the c) Paas ( Platform as a Service) - In the PaaS model, cloud myriad virtual images required to support a cloud providers deliver a computing platform and/or solution computing infrastructure. 485 All Rights Reserved © 2012 IJARCET
3.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The role of the application networking layer is to mediate, or broker, between clients and the actual applications to ensure a seamless access experience regardless of where the actual application instance might be running at any given time. It is the application networking layer that provides network and server virtualization such that the actual implementation of the cloud is hidden from external constituents. Much like storage virtualization, application networking layers present a “virtual” view of the applications and resources requiring external access.This is why dynamism is such an integral component of a cloud computing infrastructure: the application networking layer Fig.2:Private Cloud 2 running must, necessarily, keep tabs on application instances and be able to associate them with the appropriate “virtual” application it presents to external users. Classic load We are running multiple clouds on the same balancing solutions are incapable of such dynamic, near real- physical machine. At present only Infrastructure is time reconfiguration and discovery and almost always require being provided as a service. This shows that we can manual intervention. Dynamic application networking infrastructure is not only consolidate resources much more instead of using capable but excels at this type of autonomous function, bare-metal hardware. This bare-metal hardware can be integrating with the systems necessary to enable awareness of used where there is a very huge demand viz. public changes within the application infrastructure and act upon clouds.For private clouds,there is no requirement of them. bare-metal hardware. The “cloud within the cloud” need only be visible to implementers; but as we move forward and more organizations attempt to act on a localized cloud computing V - Implemented Work strategy it becomes necessary to peer inside the cloud and understand how the disparate pieces of technology combine. This visibility is a requirement if organizations are to achieve 1) Installed VMware workstation on the machine the goals desired through the implementation of a cloud running windows. computing-based architecture: efficiency and scalability 2) Installed Ubuntu Cloud (OpenStack) on two of the virtual machines with 5.5GB of RAM and two processors each. IV – Proposed Work 3) Deployed Ubuntu server(precise) on both of We propose a multi-cloud model on a single physical the clouds. Machine using Virtualization Software. This model will help utilize resources more efficiently. 4) Launched instances in both the clouds The screenshots of the same are as follows:- 5) Connected to both the instances smoothly with 1) windows running in background as the host OS. A. Screen Shorts of the implemented work Part I – Instances generated in ubuntu cloud Fig. 1:Private Cloud 1 running 2) 486 All Rights Reserved © 2012 IJARCET
4.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 1) Fig. 5: Connecting to instance 172.20.1.2 5) Fig. 3: No of instances created 2) Fig. 6:Connectecd to two instances on the same private cloud Fig.3:Connecting to an instance of IP 172.20.1.4 3) VI. CONCLUSION It is seen that there are many private clouds running on bare-metal hardware and still there is less resource utilization. So it is better to run multiple clouds on a single physical machine. This enables us to consolidate resources to a much more extent.This proposal is suitable for private clouds as there are less users compared to public clouds. Fig 4:Generated 2nd instance 172.20.1.2 in parallel VII. REFERENCES . 1.Daniel Nurmi, Rich Wolski, Sunil Soman and LamiaYouseff .Department of Computer Science 4) University of California.“The Eucalyptus Open Source Cloud Computing System”, IEEE Computer Society. 487 All Rights Reserved © 2012 IJARCET
5.
ISSN: 2278 –
1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 2. 2. K. Adams and O. Agesen. Acomparison of software and hardware techniques for x86 virtualization. In ASPLOSXII: Proceedings of the 12th international C.Shreeharsha,M.Tech(NIMS),VJTI conference on Architectural support for programming ,Matunga,Mumbai.Currently doing project work in languages and operating systems, pages 2–13, NewYork, NY, Cloud computing domain and want to pursue this in USA, 2006. ACM. the future. 3. D. GreschlerandT.Mangan. Networking lessons in delivering ’software as a service’: part ii. Int.J. Netw. Manag12(6):339–345, 2002. 4. P. Laplante, J. Zhang, and J. Voas. “What’s in a name?” distinguishing between saas and soa. IT Professional, 10(3):46–50, May-June 2008. 5. P. Barham,B.Dragovic,K. Fraser,S.Hand,T. Harris, A.Ho,R. Neugebauer,I. Pratt,andA.Warfield. Xen and the art of virtualization. In SOSP ’03: Proceedingsof the nineteenthACM symposium on Operating systems principles, pages 164–177, New York, NY, USA, 2003.ACM. 6. R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In Proceedings of the 10th IEEE International Conference on HighPerformance Computing and Communications (HPCC- 08, IEEE CS Press, Los Alamitos, CA, USA) 2008. 7. LamiaYouseff ,University of California, Santa Barbara Santa Barbara, CA 93106 lyouseff@cs.ucsb.edu “Toward a Unified Ontology of Cloud Computing” 8.Peng Li, Lee W. Toderick ,Department of Technology Systems, East Carolina University.”Cloud in Cloud – Approaches and Implementations” 9. Amazon simple storage service api (2006-03-01) – http://docs.amazonwebservices.com/ AmazonS3/2006-03- 01/. 10.OpenStack Administration Guide -www.openstack.org 10.. VMware home page – http://www.vmware.com 488 All Rights Reserved © 2012 IJARCET
Baixar agora