SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications
              (IJERA)               ISSN: 2248-9622          www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.167-171
  Client-Side Load Balancing and Resource Monitoring in Cloud
                            Miss.Rudra Koteswaramma M.Tech
                    #Assistant .Professor, DepartmentofComputer scienceAnd Engineering


ABSTRACT
         Load Balancing is a method to distribute       II. TYPES OF CLOUD
workload across one or more servers, network                     Based on the domain or environment in
interfaces, hard drives, or other computing             which clouds are used, clouds can be divided into 3
resources. Typical datacenter implementations           categories: Public Clouds-It is type of cloud which
rely on large, powerful (and expensive)                 can be access from anywhere in the world and can
computing       hardware       and      network         be accessed by anyone. Examples of this cloud are
infrastructure, which are subject to the usual          Amazon’s or Google’s cloud which are open to all
risks associated with any physical device,              after specific SLA between user and provider.
including hardware failure, power and/or                Private Clouds -In this type of cloud the specific
network interruptions, and resource limitations         organization’s or company’s employee can only get
in times of high demand. Load balancing in the          access and it will be accessible only within
cloud differs from classical thinking on load-          organization’s premises and by authenticating each
balancing architecture and implementation by            and every user, it is not open to all.
using commodity servers to perform the load
balancing. This provides for new opportunities          Hybrid Clouds (combination of both private and
and economies-of-scale, as well as presenting its       public clouds)-This types of cloud are combination
own unique set of challenges.                           of both public as well as private cloud. Most of the
                                                        commercial use is influenced by this type of cloud.
Keywords- IaaS, PaaS , SaaS, Cloud Computing,           There are three different kinds of services provide
Load balancing                                          by cloud computing, where different services are
                                                        being provided for the user
I. INTRODUCTION
          Cloud computing means that nstead of
allthe computer hardware and software we are using
sitting on our desktop, or somewhere inside our
company's network, it's provided for us as a service
by another company and accessed over the Internet,
usually in a completely seamless way. Exactly
where the hardware and software is located and how
it all works doesn't matter to us, the user—it's just
somewhere up in the nebulous "cloud" that the
Internet represents[11].
          Cloud computing is a buzzword that means
different things to different people. For some, it's
just another way of describing IT (information
technology) "outsourcing"; others use it to mean any
computing service provided over the Internet or a
similar network; and some define it as any bought-in
computer service you use that sits outside your         Fig. 1 Different services provided by cloud
firewall.
          There is no standard definition of Cloud                means weare buying access to raw
computing. Generally it consists of a bunch of          computing hardware over the Net, such as servers or
distributed servers known as masters, providing         storage. Since we buy what you need and pay-as -
demanded services and resources to different clients    you-go, this is often referred to as utility computing.
known as clients in a network with scalability and      Ordinary web hosting is a simple example of IaaS:
reliability of datacenter. The distributed computers              wepayamonthlysubscriptionorapermegabyt
provided On-demand services. Services may be of         e/giga bytefeetohaveahost ingcompanyserves up
software resources (e.g. Software as a Service,         files for our website fromtheirservers.
SaaS) or physical resources (e.g. Platform as a
Service, PaaS) or hardware/infrastructure (e.g.         B. Software as a Service (SaaS) :
Hardware as a Service, HaaS or Infrastructure as a              means we use acomplete application
Service, IaaS ).                                        running on someone else's system. Web-based email



                                                                                               167 | P a g e
Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications
              (IJERA)               ISSN: 2248-9622          www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.167-171
and Google Documents are perhaps the best-known         computing allows companies to outsource some
examples. Zoho is another well-known SaaS               resources and applications to third parties and it
provider    offering a    variety   of     office       means less hassle and less hardware in a company.
applicationsonline.                                     Just like any outsourced system, though, cloud
                                                        computing requires monitoring.
C. Platform as a Service (PaaS) :
         means we developapplications          using             What happens when the services,servers,
Web-based tools so they run on systems                  and Internet applications on which we rely on run
software and hardware provided by another               into trouble, suffer downtime, or otherwise don’t
company. So, for example, we might develop your         perform to standard? How quickly will we notice
own ecommerce website but have the whole thing,         and how well will we react? Cloud monitoring
including     the    shopping     cart,    checkout,    allows us to track the performance of the cloud
andpaymentmechanismrunning                 on       a   services we might be using. Whether we are using
merchant'sserver.Force.com(fromsalesforce.comant        popular cloud services such as Google App Engine,
he                                                      Amazon Web Services, or a customized solution,
Google App Engine are examples of PaaS.                 cloud monitoring ensures that all systems are going.
         When the technology increasesthe               Cloud monitoring allows us to follow response
complexities also increases with that. So in cloud      times, service availability and more of cloud
computing when nodes (computer resources)               services so that we can respond in the event of any
increases in the cluster it becomes a challenging       problems.
job to monitor the resources as they all integrated
and they all made to perform different task at run      B. Approach to Resource Monitoring
time. And also it becomes a challenge to us, to                   Here in this section we are developing an
shift the load on one node to another depend on         application in java where we aremonitoring the node
the scenario. In our proposed model we first            resources like RAM, CPU, Memory, Bandwidth,
establish a cloud using two nodes.Then we               Partition information, Running process information
monitor the resources like CPU,RAM, Harddisc            and utilization.
etc and alsobyUsingtheloadbalancingalgorithm we
design a system thatautomaticallybalances the load      C. What is Load Balancing?
and shifts the control to another node in the                     Load Balancing is a technique in which the
cluster.                                                workload on the resources of a node is shifts to
                                                        respective resources on the other node in a network
III. OUR APPROACH TO THE PROBLEM                        without disturbing the running task. A standard way
         In our proposed model we establish cloud       to scale web applications is by using a hardware-
setup between two computers using Ubuntu, xen           based load balancer [5]. The load balancer assumes
and Eucalyptus on peer to peer network. This can be     the IP address of the web application, so all
discussed as follows-                                   communication with the web application hits the
                                                        load balancer first. The load balancer is connected to
1. Cloud Setup - Creating cloud (test bed) by using     one or more identical web servers in the back-end.
(Ubuntu, Xen and Eucalyptus                             Depending on the user session and the load on
                                                        eachweb server, the load balancer forwards packets
2. Resource Monitoring - monitoring critical            to different web servers for processing. The
resources like RAM, CPU, memory, bandwidth,             hardware-based load balancer is designed to handle
partition information, running process information      high-level of load, so it can easily scale.
and utilization and swap usages etc.                              However, a hardware-based load balancer
                                                        uses     application       specific    hardware-based
3. Load Balancing - load balancing algorithm for        components, thus it is typically expensive. Because
homogeneous and heterogeneous architectures.            of cloud's commodity business model, a hardware-
                                                        based load balancer is rarely occurred by cloud
4. Testing - In order to evaluate the performance       providers as a service. Instead, one has to use a
of complete setup, need to deploy resource              software based load balancer running on a generic
monitoring and load balancing tools on test bed         server.
and evaluate performance of our algorithm.                        A software-based load balancer [8, 12, 1]
                                                        is not a scalable solution, though. The scalability is
A. Why Resource Monitoring?                             usually limited by the CPU and network bandwidth
         Cloud computing has become a key way           capacity of the generic server that the load balancer
for businesses to manage resources, which are now       runs on and a generic server's capacity are much
provided through remote servers and over the            smaller than that of a hardware-based load balancer.
Internet instead of through the old hard-wired          For example, in our test [11], we found that an
systems which seem so out of date today. Cloud          Amazon EC2 instance can handle at most 400 Mbps



                                                                                              168 | P a g e
Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications
              (IJERA)               ISSN: 2248-9622          www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.167-171
combined ingress and egress traffic.                    b) Module number 2
                                                                 In this module we are submitting jobs to
         Even though some cloud platforms, such         the cloud, that job is intended to be submitted to the
as Google App. Engine [7], implicitly over a            different nodes present in cloud, by checking the
hardware-based load balancer, we cannot easily get      threshold value of each and every node decision will
around their limitations because of the limited         be taken and next module get called. Fig.3 shows
control we have. In our test, Google App Engine is      the flow diagram of it.
only able to handle 10 Mbps in/out or less traffic
because of its quota mechanism.

          HTTP protocol [6] has a built-in HTTP
redirect capability, which can instruct the client to
send the request to another location instead of
returning the requested page. Using HTTP redirect,
a front -end server can load balance traffic to a
number of back- end servers. However, just like a
software load balancer, a single point of failure and
scalability bottleneck still exists.

D. Approach to Load Balancing
         Here in this load balancing task we will set
a threshold value for each resource. And we run a
thread to monitor the resource load. Once this load
crosses its threshold value then we first gather all
information about process task and then shift that
task to another node’s resource without disturbing
running task. The Algorithm we are going to use is
Signature Driven Load management for Cloud
Computing Infrastructure.
                                                        Fig. 3 Module number 2
IV. IMPLEMENTATION
a) Module number 1                                      c) Module number 3
         The SigLM algorithm first selects the                   In module number 3 threads which are
different resources like RAM, hard disk space, etc      ready to be submitted are checked by or load
to monitor and set some threshold value to each and     balancing algorithm along with that it also verifies
every resources through which we can divert the         the threshold value of the node as well as threshold
load to another node present in the cloud. Fig.2        value of the upcoming load if it satisfied the request
shows the flow diagram of it.                           will be forwarded to module 4 otherwise that
                                                        request will get declined. Fig.4 shows the flowchart
                                                        of it.




Fig. 1.2 Module number 1                                Fig. 4 Module number 3




                                                                                              169 | P a g e
Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications
              (IJERA)               ISSN: 2248-9622          www.ijera.com
                   Vol. 2, Issue 6, November- December 2012, pp.167-171
d) Module number 4
         This module checks the signature of the
task and node if it matches it calculate the Dynamic
time Wrapping and according to it, it is forwarded to
module 5, if DTW [5] does not match the task will
get declined. Fig.5 shows the flow diagram of it




Fig. 5 Module number 4
                                                        V. CONCLUSION
e) Module number 5                                                In this paper I created private Cloud setup
         Balancing using Signature DTW Algorithm        using Ubuntu, xen and Eucalyptus and that we use
[14], it creates thread on node, and creates DSN        as a test bed for carrying out implementation of
thread and put it on wait, after that it connects       DTW algorithm. We also did literature survey of
source node thread to destination thread by calling     existing resource monitoring tools as well as load
RMI and in this way complete execution of task.         balancing tools and come up with an algorithm for
After completion of task it is submitted to the         different architecture with better performance.
Module 6. Fig.6 shows the flow diagram of it.                     In this paper we discuss the implementation
                                                        modules of Signature pattern matching DTW
                                                                  algorithm with the proper flow diagrams
                                                        which simplifies the work of Load Balancer. The
                                                        proposed metrics could be further refined by taking
                                                        more detailed formalism for each module.

                                                        REFERENCES
                                                          [1]    Tony Bourke: Server Load Balancing,
                                                                 O'Reilly, ISBN 0-596-00050-2
                                                          [2]     Chandra Kopparapu: Load Balancing
                                                                 Servers, Firewalls & Caches, Wiley,
                                                                 ISBN 0-471-41550-2
                                                          [3]     Robert J. Shimonski: Windows Server
                                                                 2003 Clustering & Load Balancing,
                                                                 Osborne McGraw-Hill,       ISBN 0-07-
                                                                 222622-6
                                                          [4]     Jeremy Zawodny, Derek J. Balling: High
                                                                 Performance MySQL, O'Reilly, ISBN 0-
Fig. 6 Module number 5                                           596-00306-4
                                                          [5]    J. Kruskall and M. Liberman. The
f) Module number 6                                               Symmetric TimeWarping Problem: From
        It frees the threads, by pulling source node             Continuous to Discrete.
thread back to the source and put it on to sleep. It             In Time Warps, String Edits and
also resumes DSN thread and stop the                             Macromolecules: The Theory and
execution.Fig.7 shows the flow diagram of it.                    Practice of Sequence Comparison, pp.


                                                                                              170 | P a g e
Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications
             (IJERA)               ISSN: 2248-9622          www.ijera.com
                  Vol. 2, Issue 6, November- December 2012, pp.167-171
        125-161, Addison-Wesley Publishing Co.,
        1983.
 [6]     Matthew Syme,             Philip Goldie:
        Optimizing Network Performance with
        Content Switching: Server, Firewall and
        Cache Load balancing'', Prentice Hall
        PTR, ISBN 0-13-101468-5
 [7]    Anthony T.Velte, Toby J.Velte, Robert
        Elsenpeter, Cloud Computing A Practical
        Approach,      TATA      McGRAW-HILL
        Edition
 [8]    2010.Martin Randles, David Lamb, A.
        Taleb-Bendiab, A Comparative Study into
        Distributed
 [9]    Load Balancing Algorithms for Cloud
        Computing, 2010 IEEE 24th International
        Conference on Advanced Information
        Networking and Applications Workshops.
        Mladen A. Vouk, Cloud Computing Issues,
        Research        and       Implementations,
        Proceedings of the ITI 2008 30th Int. Conf.
        on Information Technology Interfaces,
        2008, June 23-26.
 [10]   Ali M. Alakeel, A Guide to Dynamic Load
        Balancing in Distributed
 [11]   http://www.amazon.com/gp/browse.html?n
        ode=201590011
 [12]   Amazon       Elastic    Compute      Cloud
        http://aws.amazon.com/ec2/.
 [13]   M. Vlachos, M. Hadjieleftheriou, D.
        Gunopulos, and E. Keogh. Indexing Multi-
        Dimensional Time-Series with Support for
        Multiple Distance Measures. Proc. of
        SIGKDD, 2003.
 [14]   Keogh and C. A. Ratanamahatana. Exact
        indexing of dynamic time warping.
        Journal of Knowledge and Information
        Systems, 2004.




                                                                             171 | P a g e

Mais conteúdo relacionado

Mais procurados

Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud management
Cloud managementCloud management
Cloud managementsurbhi jha
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing TechnologyAhmed Al Salih
 
Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemJoão Gabriel Lima
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-IntroductionSuchithra Suriya
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam readyHai Nguyen
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud ComputingKarthik Sankar
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101Otto Mora
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computingAkhil Raj
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud ComputingNaveen Karn
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesEueung Mulyana
 
Top 31 Cloud Computing Interview Questions and Answers.
Top 31 Cloud Computing Interview Questions and Answers.Top 31 Cloud Computing Interview Questions and Answers.
Top 31 Cloud Computing Interview Questions and Answers.Ecare Technologies
 

Mais procurados (17)

Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud management
Cloud managementCloud management
Cloud management
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing Technology
 
367 370
367 370367 370
367 370
 
Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop system
 
cloud computing-Introduction
cloud computing-Introductioncloud computing-Introduction
cloud computing-Introduction
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Cloud security cam ready
Cloud security cam readyCloud security cam ready
Cloud security cam ready
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud Computing
 
Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?Virtualization vs. Cloud Computing: What's the Difference?
Virtualization vs. Cloud Computing: What's the Difference?
 
Cloud computing 101
Cloud computing 101Cloud computing 101
Cloud computing 101
 
484 488
484 488484 488
484 488
 
Virtualization & Cloud computing
Virtualization & Cloud computingVirtualization & Cloud computing
Virtualization & Cloud computing
 
Presenting Cloud Computing
Presenting Cloud ComputingPresenting Cloud Computing
Presenting Cloud Computing
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Top 31 Cloud Computing Interview Questions and Answers.
Top 31 Cloud Computing Interview Questions and Answers.Top 31 Cloud Computing Interview Questions and Answers.
Top 31 Cloud Computing Interview Questions and Answers.
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Destaque (20)

Cf31537544
Cf31537544Cf31537544
Cf31537544
 
S26117122
S26117122S26117122
S26117122
 
Mx2522172219
Mx2522172219Mx2522172219
Mx2522172219
 
Ms2521852190
Ms2521852190Ms2521852190
Ms2521852190
 
Y25124127
Y25124127Y25124127
Y25124127
 
Kf2517971799
Kf2517971799Kf2517971799
Kf2517971799
 
Iw2515781584
Iw2515781584Iw2515781584
Iw2515781584
 
Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Iq2515441549
Iq2515441549Iq2515441549
Iq2515441549
 
Jj2516631667
Jj2516631667Jj2516631667
Jj2516631667
 
Kd2517851787
Kd2517851787Kd2517851787
Kd2517851787
 
Lg2519531959
Lg2519531959Lg2519531959
Lg2519531959
 
Ja2516031606
Ja2516031606Ja2516031606
Ja2516031606
 
Jo2516951697
Jo2516951697Jo2516951697
Jo2516951697
 
Il2515051516
Il2515051516Il2515051516
Il2515051516
 
Hz2514321439
Hz2514321439Hz2514321439
Hz2514321439
 
Jr2517091717
Jr2517091717Jr2517091717
Jr2517091717
 
Jv2517361741
Jv2517361741Jv2517361741
Jv2517361741
 
Ic2514531457
Ic2514531457Ic2514531457
Ic2514531457
 
El CóMic Ic.
El CóMic Ic.El CóMic Ic.
El CóMic Ic.
 

Semelhante a Z26167171

Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing PresentationMohammed Kharma
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingsuraj bhandari
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyKingsley Mensah
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 reportsuthi
 
Business Cloud Integration Glossary
Business Cloud Integration GlossaryBusiness Cloud Integration Glossary
Business Cloud Integration GlossaryHubspan
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud computing
Cloud computingCloud computing
Cloud computingprasanth82
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1charan7575
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxPiyush793067
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxssuserf71896
 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxaravym456
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center ProjectAbhijit Kundu
 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control AuditingNavin Malhotra
 

Semelhante a Z26167171 (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Oruta phase1 report
Oruta phase1 reportOruta phase1 report
Oruta phase1 report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Business Cloud Integration Glossary
Business Cloud Integration GlossaryBusiness Cloud Integration Glossary
Business Cloud Integration Glossary
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
 
Clpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptxClpud-Computing-PPT-3.pptx
Clpud-Computing-PPT-3.pptx
 
Clpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptxClpud-Computing-PPT-3_cloud_computing.pptx
Clpud-Computing-PPT-3_cloud_computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Introducing cloud computing complete
Introducing cloud computing completeIntroducing cloud computing complete
Introducing cloud computing complete
 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control Auditing
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Z26167171

  • 1. Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.167-171 Client-Side Load Balancing and Resource Monitoring in Cloud Miss.Rudra Koteswaramma M.Tech #Assistant .Professor, DepartmentofComputer scienceAnd Engineering ABSTRACT Load Balancing is a method to distribute II. TYPES OF CLOUD workload across one or more servers, network Based on the domain or environment in interfaces, hard drives, or other computing which clouds are used, clouds can be divided into 3 resources. Typical datacenter implementations categories: Public Clouds-It is type of cloud which rely on large, powerful (and expensive) can be access from anywhere in the world and can computing hardware and network be accessed by anyone. Examples of this cloud are infrastructure, which are subject to the usual Amazon’s or Google’s cloud which are open to all risks associated with any physical device, after specific SLA between user and provider. including hardware failure, power and/or Private Clouds -In this type of cloud the specific network interruptions, and resource limitations organization’s or company’s employee can only get in times of high demand. Load balancing in the access and it will be accessible only within cloud differs from classical thinking on load- organization’s premises and by authenticating each balancing architecture and implementation by and every user, it is not open to all. using commodity servers to perform the load balancing. This provides for new opportunities Hybrid Clouds (combination of both private and and economies-of-scale, as well as presenting its public clouds)-This types of cloud are combination own unique set of challenges. of both public as well as private cloud. Most of the commercial use is influenced by this type of cloud. Keywords- IaaS, PaaS , SaaS, Cloud Computing, There are three different kinds of services provide Load balancing by cloud computing, where different services are being provided for the user I. INTRODUCTION Cloud computing means that nstead of allthe computer hardware and software we are using sitting on our desktop, or somewhere inside our company's network, it's provided for us as a service by another company and accessed over the Internet, usually in a completely seamless way. Exactly where the hardware and software is located and how it all works doesn't matter to us, the user—it's just somewhere up in the nebulous "cloud" that the Internet represents[11]. Cloud computing is a buzzword that means different things to different people. For some, it's just another way of describing IT (information technology) "outsourcing"; others use it to mean any computing service provided over the Internet or a similar network; and some define it as any bought-in computer service you use that sits outside your Fig. 1 Different services provided by cloud firewall. There is no standard definition of Cloud means weare buying access to raw computing. Generally it consists of a bunch of computing hardware over the Net, such as servers or distributed servers known as masters, providing storage. Since we buy what you need and pay-as - demanded services and resources to different clients you-go, this is often referred to as utility computing. known as clients in a network with scalability and Ordinary web hosting is a simple example of IaaS: reliability of datacenter. The distributed computers wepayamonthlysubscriptionorapermegabyt provided On-demand services. Services may be of e/giga bytefeetohaveahost ingcompanyserves up software resources (e.g. Software as a Service, files for our website fromtheirservers. SaaS) or physical resources (e.g. Platform as a Service, PaaS) or hardware/infrastructure (e.g. B. Software as a Service (SaaS) : Hardware as a Service, HaaS or Infrastructure as a means we use acomplete application Service, IaaS ). running on someone else's system. Web-based email 167 | P a g e
  • 2. Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.167-171 and Google Documents are perhaps the best-known computing allows companies to outsource some examples. Zoho is another well-known SaaS resources and applications to third parties and it provider offering a variety of office means less hassle and less hardware in a company. applicationsonline. Just like any outsourced system, though, cloud computing requires monitoring. C. Platform as a Service (PaaS) : means we developapplications using What happens when the services,servers, Web-based tools so they run on systems and Internet applications on which we rely on run software and hardware provided by another into trouble, suffer downtime, or otherwise don’t company. So, for example, we might develop your perform to standard? How quickly will we notice own ecommerce website but have the whole thing, and how well will we react? Cloud monitoring including the shopping cart, checkout, allows us to track the performance of the cloud andpaymentmechanismrunning on a services we might be using. Whether we are using merchant'sserver.Force.com(fromsalesforce.comant popular cloud services such as Google App Engine, he Amazon Web Services, or a customized solution, Google App Engine are examples of PaaS. cloud monitoring ensures that all systems are going. When the technology increasesthe Cloud monitoring allows us to follow response complexities also increases with that. So in cloud times, service availability and more of cloud computing when nodes (computer resources) services so that we can respond in the event of any increases in the cluster it becomes a challenging problems. job to monitor the resources as they all integrated and they all made to perform different task at run B. Approach to Resource Monitoring time. And also it becomes a challenge to us, to Here in this section we are developing an shift the load on one node to another depend on application in java where we aremonitoring the node the scenario. In our proposed model we first resources like RAM, CPU, Memory, Bandwidth, establish a cloud using two nodes.Then we Partition information, Running process information monitor the resources like CPU,RAM, Harddisc and utilization. etc and alsobyUsingtheloadbalancingalgorithm we design a system thatautomaticallybalances the load C. What is Load Balancing? and shifts the control to another node in the Load Balancing is a technique in which the cluster. workload on the resources of a node is shifts to respective resources on the other node in a network III. OUR APPROACH TO THE PROBLEM without disturbing the running task. A standard way In our proposed model we establish cloud to scale web applications is by using a hardware- setup between two computers using Ubuntu, xen based load balancer [5]. The load balancer assumes and Eucalyptus on peer to peer network. This can be the IP address of the web application, so all discussed as follows- communication with the web application hits the load balancer first. The load balancer is connected to 1. Cloud Setup - Creating cloud (test bed) by using one or more identical web servers in the back-end. (Ubuntu, Xen and Eucalyptus Depending on the user session and the load on eachweb server, the load balancer forwards packets 2. Resource Monitoring - monitoring critical to different web servers for processing. The resources like RAM, CPU, memory, bandwidth, hardware-based load balancer is designed to handle partition information, running process information high-level of load, so it can easily scale. and utilization and swap usages etc. However, a hardware-based load balancer uses application specific hardware-based 3. Load Balancing - load balancing algorithm for components, thus it is typically expensive. Because homogeneous and heterogeneous architectures. of cloud's commodity business model, a hardware- based load balancer is rarely occurred by cloud 4. Testing - In order to evaluate the performance providers as a service. Instead, one has to use a of complete setup, need to deploy resource software based load balancer running on a generic monitoring and load balancing tools on test bed server. and evaluate performance of our algorithm. A software-based load balancer [8, 12, 1] is not a scalable solution, though. The scalability is A. Why Resource Monitoring? usually limited by the CPU and network bandwidth Cloud computing has become a key way capacity of the generic server that the load balancer for businesses to manage resources, which are now runs on and a generic server's capacity are much provided through remote servers and over the smaller than that of a hardware-based load balancer. Internet instead of through the old hard-wired For example, in our test [11], we found that an systems which seem so out of date today. Cloud Amazon EC2 instance can handle at most 400 Mbps 168 | P a g e
  • 3. Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.167-171 combined ingress and egress traffic. b) Module number 2 In this module we are submitting jobs to Even though some cloud platforms, such the cloud, that job is intended to be submitted to the as Google App. Engine [7], implicitly over a different nodes present in cloud, by checking the hardware-based load balancer, we cannot easily get threshold value of each and every node decision will around their limitations because of the limited be taken and next module get called. Fig.3 shows control we have. In our test, Google App Engine is the flow diagram of it. only able to handle 10 Mbps in/out or less traffic because of its quota mechanism. HTTP protocol [6] has a built-in HTTP redirect capability, which can instruct the client to send the request to another location instead of returning the requested page. Using HTTP redirect, a front -end server can load balance traffic to a number of back- end servers. However, just like a software load balancer, a single point of failure and scalability bottleneck still exists. D. Approach to Load Balancing Here in this load balancing task we will set a threshold value for each resource. And we run a thread to monitor the resource load. Once this load crosses its threshold value then we first gather all information about process task and then shift that task to another node’s resource without disturbing running task. The Algorithm we are going to use is Signature Driven Load management for Cloud Computing Infrastructure. Fig. 3 Module number 2 IV. IMPLEMENTATION a) Module number 1 c) Module number 3 The SigLM algorithm first selects the In module number 3 threads which are different resources like RAM, hard disk space, etc ready to be submitted are checked by or load to monitor and set some threshold value to each and balancing algorithm along with that it also verifies every resources through which we can divert the the threshold value of the node as well as threshold load to another node present in the cloud. Fig.2 value of the upcoming load if it satisfied the request shows the flow diagram of it. will be forwarded to module 4 otherwise that request will get declined. Fig.4 shows the flowchart of it. Fig. 1.2 Module number 1 Fig. 4 Module number 3 169 | P a g e
  • 4. Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.167-171 d) Module number 4 This module checks the signature of the task and node if it matches it calculate the Dynamic time Wrapping and according to it, it is forwarded to module 5, if DTW [5] does not match the task will get declined. Fig.5 shows the flow diagram of it Fig. 5 Module number 4 V. CONCLUSION e) Module number 5 In this paper I created private Cloud setup Balancing using Signature DTW Algorithm using Ubuntu, xen and Eucalyptus and that we use [14], it creates thread on node, and creates DSN as a test bed for carrying out implementation of thread and put it on wait, after that it connects DTW algorithm. We also did literature survey of source node thread to destination thread by calling existing resource monitoring tools as well as load RMI and in this way complete execution of task. balancing tools and come up with an algorithm for After completion of task it is submitted to the different architecture with better performance. Module 6. Fig.6 shows the flow diagram of it. In this paper we discuss the implementation modules of Signature pattern matching DTW algorithm with the proper flow diagrams which simplifies the work of Load Balancer. The proposed metrics could be further refined by taking more detailed formalism for each module. REFERENCES [1] Tony Bourke: Server Load Balancing, O'Reilly, ISBN 0-596-00050-2 [2] Chandra Kopparapu: Load Balancing Servers, Firewalls & Caches, Wiley, ISBN 0-471-41550-2 [3] Robert J. Shimonski: Windows Server 2003 Clustering & Load Balancing, Osborne McGraw-Hill, ISBN 0-07- 222622-6 [4] Jeremy Zawodny, Derek J. Balling: High Performance MySQL, O'Reilly, ISBN 0- Fig. 6 Module number 5 596-00306-4 [5] J. Kruskall and M. Liberman. The f) Module number 6 Symmetric TimeWarping Problem: From It frees the threads, by pulling source node Continuous to Discrete. thread back to the source and put it on to sleep. It In Time Warps, String Edits and also resumes DSN thread and stop the Macromolecules: The Theory and execution.Fig.7 shows the flow diagram of it. Practice of Sequence Comparison, pp. 170 | P a g e
  • 5. Miss.Rudra Koteswaramma / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.167-171 125-161, Addison-Wesley Publishing Co., 1983. [6] Matthew Syme, Philip Goldie: Optimizing Network Performance with Content Switching: Server, Firewall and Cache Load balancing'', Prentice Hall PTR, ISBN 0-13-101468-5 [7] Anthony T.Velte, Toby J.Velte, Robert Elsenpeter, Cloud Computing A Practical Approach, TATA McGRAW-HILL Edition [8] 2010.Martin Randles, David Lamb, A. Taleb-Bendiab, A Comparative Study into Distributed [9] Load Balancing Algorithms for Cloud Computing, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops. Mladen A. Vouk, Cloud Computing Issues, Research and Implementations, Proceedings of the ITI 2008 30th Int. Conf. on Information Technology Interfaces, 2008, June 23-26. [10] Ali M. Alakeel, A Guide to Dynamic Load Balancing in Distributed [11] http://www.amazon.com/gp/browse.html?n ode=201590011 [12] Amazon Elastic Compute Cloud http://aws.amazon.com/ec2/. [13] M. Vlachos, M. Hadjieleftheriou, D. Gunopulos, and E. Keogh. Indexing Multi- Dimensional Time-Series with Support for Multiple Distance Measures. Proc. of SIGKDD, 2003. [14] Keogh and C. A. Ratanamahatana. Exact indexing of dynamic time warping. Journal of Knowledge and Information Systems, 2004. 171 | P a g e