SlideShare a Scribd company logo
1 of 8
Download to read offline
An Effective User Requirements and Resource Management in an
Academic Cloud-A Review
C.Madhumathi 1
, Gopinath Ganapathy2
School of Computer Science, Engineering and Applications
Bharathidasan University, Tiruchirapalli, TamilNadu 620 023, India.
1
madhu.csbdu54@gmail.com
2
gganapathy@gmail.com
Abstract:
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
Keywords: Resource Management-User Requirements- Academic Cloud-SMI-Package
selection.
Introduction: Cloud Computing is a model that enables on-demand network access to a
shared pool of configurable computing resources that can be rapidly provisioned and released
with minimal management effort or service provider interaction. Cloud computing consists of
five different characteristics such as On-demand self service, Broad network access, Resource
Pooling, Rapid Elasticity and Measured Service. Cloud computing provides three types of
service models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and
Software as a Service (SaaS). It has four types of deployment models such as Private Cloud,
Public Cloud, Hybrid Cloud and Community Cloud [1]. Virtualization plays a major role in
Cloud computing. It is the creation of virtual operating system, server, storage device and
network resources. There are two different approaches in virtualization. They are full and para
virtualization. Full virtualization consists of complete simulation of the actual hardware. It
cannot touch the source code of base or guest operating system. In para virtualization hardware
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
249 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
is not simulated. It abstracts the base architecture. It works without VT technology enabled [2].
Effective cloud service can only be obtained by an effective virtual resource management
which is built up from the available physical resources. Cloud service could be effective only
when it meets the user requirement.
Related Works:
Sunil kumar et.al made a review about the Resource management of cloud at IaaS level. Issues,
Solutions, tools, techniques involved in resource management at IaaS level are explained in
detail and also specifies the necessity of management of resources in cloud perspective [2].
Saurabh Kumar et.al, specifies the framework for SMI for ranking cloud services. In his
framework, SMI cloud architecture specifies the service selection and ranking based on QoS
and previous user experiences. It also specifies the QoS parameters to be considered for service
selection [3]. Madhumathi et.al, specifies the SMI based Workload recommendation for
academic usage logs. In her work, Cloud package selection based on AHP (Analytic
Hierarchical Process) using MCDM (Multi Criteria Decision Making) technique narrates the
identification technique of academic user requirements [4].
Academic User Requirements:
In an academic scenario, the end users are either student/faculty. Their requirements could be
either a request for a virtual machine or a package. The requirements are first checked with
SLA (Service Level Agreements). It is defined as an official commitment that prevails between
a service provider and a user. Automation of user requirements mainly depends upon the SLA
and SMI of a cloud provider. Quality of Service is attained when it satisfies both SLA and SMI.
Service Level Agreement (SLA):
SLAs offered by service providers as service-based agreement. SLA management consist of
the SLA contract definition, SLA negotiation, SLA monitoring, SLA violation detection and
SLA enforcement [5].
Service Measurement Index (SMI):
The Service Measurement Index (SMI) is a set of business-relevant key performance indicators
(KPI’s) that provide standardized method for measuring the services. CSMIC (Cloud Services
Measurement Initiative Consortium) develops SMI for measuring services provided by
different cloud service providers [6]. Each Service provider has their own SLA. SMI consists
of six key metrics such as Accountability, Agility, Assurance of Service, Cost, Performance,
Security and Usability [6]. These are further divided into the following factors.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
250 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
SMI Key metrics Functions
Accountability Auditability, Compliance, data ownership,
provider ethicality and sustainability.
Agility Elasticity, portability, adaptability and
flexibility.
Performance Functionality, Service Response time and
Accuracy.
Assurance Reliability, Resiliency and Service stability.
Security Confidentiality, privacy, data integrity and
availability.
Usability Accessibility, Installability, Learnability,
and Operability.
Table.1 Functions of SMI key metrics [3][7]
Quality of Service (QoS):
Quality of Service is attained when a service provider satisfies the user’s requirement. In
order to provide an efficient quality of service effective resource management is needed.
There are 14 Quality of Service parameters to be considered for evaluation. In which first
nine parameters are quantitative and last five parameters are qualitative.
S.No QoS parameters
1. Bandwidth (Bw)
2. Computation Capability (CC)
3. Availability (Av)
4. Correctness (Cr)
5. Usability (Us)
6. Reliability (Re)
7. Variable computation load (Vc)
8. Serviceability (Se)
9. Latency (l)
10. Security (S)
11. Portability (P)
12. Reliable storage (Rs)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
251 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
13. Data Backup (Db)
14. Customization (Cu)
Table.2 List of QoS parameters [8]
From the above table, the nine quantifiable attributes are calculated as follows [8] [9],
1. Bandwidth: Network bandwidth refers to the number of bits transferred (sent/
received) in a single workload per unit time (usually in seconds).
2. Computational Capacity: Computational capacity corresponds to the ratio between
the actual usage time and the expected usage time.
3. Availability: Availability refers to the recovery level of the system in case of failure.
4. Correctness: Correctness defines the degree of accuracy provided to the cloud
customers.
5. Usability: Usability refers to the ratio of successful workload operations exhibited by
the system.
6. Reliability: Reliability refers to the time taken for the system to recover and operate
successfully after a failure.
7. Variable computing load: It is the change in the load balance with respect to time.
Calculating the variance of the workload can be used to identify this parameter.
8. Serviceability: Serviceability is the probability of the service being up and running.
9. Latency: Latency is the difference between the workload input and output times.
Network Bandwidth=Bits/ second
(B/S)
Computing Capacity=Actual Usage time of the Resource/Expected Usage time of
the Resource.
Availability=mean time to failure/ (mean time to failure + mean time to repair)
Correctness=total number of failed transmissions/ (total number of failed
transmissions + total number of successful transmissions)
Usability=no of successful operations in a workload/ (total operations available
in the workload)
Reliability=mean time to failure + mean time to repair
Serviceability= Service Uptime/ (Service Uptime+ Service Downtime)
Latency = Time of output produced with respect to that Cloud workload - Time
of input in a Cloud workload
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
252 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
The last five parameters which are qualitative are calculated based on the user assigned
weights of range scale. The user assigns points based on the quality of parameters within a
range scale for example user can assign a weight for security within the range from 1-5.
Resource Management
Management of both physical and virtual resources plays a major role in cloud
computing. In order to provide effective cloud services effective resource management is a
must. Hypervisor is used in the creation of virtual resources [2].
Hypervisor
Hypervisor or virtual machine monitor (VMM) is a computer software, firmware or
hardware that creates and runs virtual machines. Host machine is a computer on which a
hypervisor runs one or more virtual machines and each virtual machine is called a guest
machine. Operating system which runs on the host machine is called as host operating system
whereas which runs on the guest machine is called as guest operating system. Hypervisor
presents the guest operating systems with a virtual operating platform and manages the
execution of the guest operating system [10]. There are two types of hypervisor. They are,
Type 1 (or) Baremetal (or) Native Hypervisors
It runs directly on the host’s hardware. It runs mostly on the provider side server
machines. Eg: Xen, Oracle VM, VMware ESX/ESXi, Microsoft Hyper-V.
Figure.1 Type 1 Hypervisors
Type 2 (or) Hosted Hypervisors
It runs on an operating system just as other computer programs. It runs mostly on
the client side machines. Eg: VirtualBox, VMware Workstation, QEMU.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
253 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Figure.2 Type 2 Hypervisors
Thus effective resource management deals with one or more of the following ten factors.
They are listed below.
Table.3 Issues in Effective Management of Resource [2]
Resource Provisioning- Allocation of Service provider’s resources to a user.
Resource Allocation- Distribution of resources among users or programs.
Resource Adaptation- Dynamic adjustment of resources to fulfil the requirements of the user.
Resource Mapping- Mapping of the resources available with the provider and required by the
user.
Resource Modelling- It illustrates the attributes such as states, transitions, inputs and outputs
in subsequent time intervals.
Resource Estimation- Prior planning of resources required either through guess or calculation.
Resource Discovery- Identification of required resource from available resources.
Effective
Management of
Resource
Provisioning
Allocation
Adaptation
Mapping
Modelling
Estimation
Discovery
Selection
Brokering
Scheduling
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
254 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
Resource Selection- Selecting the best or optimum resource from a pool of available resource.
Resource Brokering- Negotiation between the cloud broker and user in order to attain the
necessary resource at expected time and within the specified objectives.
Resource Scheduling- Sharing resource at certain time bound and occurrence of events at
those time interval.
Conclusion:
Thus effective resource management is essential in a cloud scenario inorder to meet
the user’s requirements. In this paper, the terminologies related to cloud resources from the
provider and user perspective are narrated in a watertight way. The cloud packages which
satisfies the SMI, SLA and QoS parameters are provided as service when required by the user.
This paper illustrates the need for effective resource management and it lays a foundation for
various research work to be carried out in these criteria in an academic perspective.
References:
[1] Peter Mell (NIST), Tim Grance (NIST), “The NIST Definition of Cloud Computing”,
September 2011
[2] Sunilkumar S et.al, “Resource management for Infrastructure as a Service (IaaS) in cloud
computing: A survey”, Journal of Network and Computer Applications 41(2014) , PP. 424–
440.
[3] Saurabh Kumar Garg,Steve Versteeg and Rajkumar buyya, “ SMICloud: A Framework for
comparing and Ranking Cloud Services”, 2011 Fourth IEEE International Conference on
Utility and Cloud Computing, PP.210-218.
[4] C.Madhumathi, Gopinath Ganapathy, “Cloud Package Selection for Academic
Requirements using Multi Criteria Decision Making based Modified Ant Colony Optimization
Technique” , Vol 8 No 2 Apr-May 2016, pp.1205-1211.
[5] Nie G., E. X., Chen D. (2012) Research on Service Level Agreement in Cloud
Computing. In: Hu W. (eds) Advances in Electric and Electronics. Lecture Notes in
Electrical Engineering, vol 155. Springer, Berlin, Heidelberg.
[6] https://en.wikipedia.org/wiki/Service_Measurement_Index.
[7] C.Madhumathi, Gopinath Ganapathy, “ Effective User Requirements Identification and
SMI Parameter based WorkLoad Recommendation for Academic Clouds based on Usage
logs”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11,
Number 6 (2016) pp 4091-4096.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
255 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
[8] C.Madhumathi, Gopinath Ganapathy, “Requirement Intensity based Resource Provisioning
for e-Learning in Multi-cloud to Avoid Vendor Lock-ins” , volume 11 No.17, September 2016,
pp. 1-8.
[9] Mohamed Firdhous, Suhaidi Hassan, Osman Ghazali, “A Comprehensive Survey on
Quality of Service Implementations in Cloud Computing”, International Journal of Scientific
& Engineering Research, Volume 4, Issue 5, May-2013, pp.118-123.
[10] Vignesh V, Sendhil Kumar KS, Jaisankar N, “Resource Management and Scheduling in
Cloud Environment”, International Journal of Scientific and Research Publications, Volume 3,
Issue 6, June 2013, pp.1-6.
[11] Linlin Wu and Rajkumar Buyya, “Service Level Agreement (SLA) in Utility Computing
Systems”.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 15, No. 9, September 2017
256 https://sites.google.com/site/ijcsis/
ISSN 1947-5500

More Related Content

What's hot

GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
A Virtual Machine Resource Management Method with Millisecond Precision
A Virtual Machine Resource Management Method with Millisecond PrecisionA Virtual Machine Resource Management Method with Millisecond Precision
A Virtual Machine Resource Management Method with Millisecond PrecisionIRJET Journal
 
Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3ijccsa
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...hemanthbbc
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture serviceeSAT Publishing House
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudEditor IJCATR
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd Iaetsd
 

What's hot (16)

GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTINGGROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING
 
Pricing model
Pricing modelPricing model
Pricing model
 
A Virtual Machine Resource Management Method with Millisecond Precision
A Virtual Machine Resource Management Method with Millisecond PrecisionA Virtual Machine Resource Management Method with Millisecond Precision
A Virtual Machine Resource Management Method with Millisecond Precision
 
Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3Cloud computing performance evaluation issues and challenges3
Cloud computing performance evaluation issues and challenges3
 
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...Ieeepro techno solutions   2014 ieee java project - assessing collaboration f...
Ieeepro techno solutions 2014 ieee java project - assessing collaboration f...
 
Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
Overview of cloud computing architecture service
Overview of cloud computing architecture serviceOverview of cloud computing architecture service
Overview of cloud computing architecture service
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
F1034047
F1034047F1034047
F1034047
 
T04503113118
T04503113118T04503113118
T04503113118
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
Hybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in CloudHybrid Based Resource Provisioning in Cloud
Hybrid Based Resource Provisioning in Cloud
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
Iaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with costIaetsd effective fault toerant resource allocation with cost
Iaetsd effective fault toerant resource allocation with cost
 

Similar to An Effective User Requirements and Resource Management in an Academic Cloud - A Review

Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingIOSRjournaljce
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server EnvironmentTime Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environmentrahulmonikasharma
 
A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...TELKOMNIKA JOURNAL
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service brokerIJECEIAES
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingINFOGAIN PUBLICATION
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...ASAITHAMBIRAJAA
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobileAhmed Hammam
 
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...csandit
 
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...cscpconf
 

Similar to An Effective User Requirements and Resource Management in an Academic Cloud - A Review (20)

Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
A017620123
A017620123A017620123
A017620123
 
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server EnvironmentTime Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environment
 
A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Availability in Cloud Computing
Availability in Cloud ComputingAvailability in Cloud Computing
Availability in Cloud Computing
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Dynamic congestion management system for cloud service broker
Dynamic congestion management system for cloud service  brokerDynamic congestion management system for cloud service  broker
Dynamic congestion management system for cloud service broker
 
Revenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud ComputingRevenue Maximization with Good Quality of Service in Cloud Computing
Revenue Maximization with Good Quality of Service in Cloud Computing
 
Enhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud StorageEnhancing Data Integrity in Multi Cloud Storage
Enhancing Data Integrity in Multi Cloud Storage
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...Ieeepro techno solutions   2014 ieee dotnet project - assessing collaboration...
Ieeepro techno solutions 2014 ieee dotnet project - assessing collaboration...
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
A trust management system for ad hoc mobile
A trust management system for ad hoc mobileA trust management system for ad hoc mobile
A trust management system for ad hoc mobile
 
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...A cloud broker approach with qos attendance and soa for hybrid cloud computin...
A cloud broker approach with qos attendance and soa for hybrid cloud computin...
 
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTIN...
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

An Effective User Requirements and Resource Management in an Academic Cloud - A Review

  • 1. An Effective User Requirements and Resource Management in an Academic Cloud-A Review C.Madhumathi 1 , Gopinath Ganapathy2 School of Computer Science, Engineering and Applications Bharathidasan University, Tiruchirapalli, TamilNadu 620 023, India. 1 madhu.csbdu54@gmail.com 2 gganapathy@gmail.com Abstract: User requirements and Resource Management is more important in cloud computing. Automation of user requirements phase is still not available in a cloud scenario. User requirements layer specifies the capacity of virtual machine required by the user and applicatons to be placed within the virtual machine. Based on the history of user requirements in an academic institution they could be converted into packages and the user selects the appropriate package. User requirements are then mapped to both SMI and SLA for appropriate package selection. Both the user requirements and packages rely on the underling infrastructure resources. Hence effective resource management is must in academic institutions. Keywords: Resource Management-User Requirements- Academic Cloud-SMI-Package selection. Introduction: Cloud Computing is a model that enables on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing consists of five different characteristics such as On-demand self service, Broad network access, Resource Pooling, Rapid Elasticity and Measured Service. Cloud computing provides three types of service models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). It has four types of deployment models such as Private Cloud, Public Cloud, Hybrid Cloud and Community Cloud [1]. Virtualization plays a major role in Cloud computing. It is the creation of virtual operating system, server, storage device and network resources. There are two different approaches in virtualization. They are full and para virtualization. Full virtualization consists of complete simulation of the actual hardware. It cannot touch the source code of base or guest operating system. In para virtualization hardware International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 249 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 2. is not simulated. It abstracts the base architecture. It works without VT technology enabled [2]. Effective cloud service can only be obtained by an effective virtual resource management which is built up from the available physical resources. Cloud service could be effective only when it meets the user requirement. Related Works: Sunil kumar et.al made a review about the Resource management of cloud at IaaS level. Issues, Solutions, tools, techniques involved in resource management at IaaS level are explained in detail and also specifies the necessity of management of resources in cloud perspective [2]. Saurabh Kumar et.al, specifies the framework for SMI for ranking cloud services. In his framework, SMI cloud architecture specifies the service selection and ranking based on QoS and previous user experiences. It also specifies the QoS parameters to be considered for service selection [3]. Madhumathi et.al, specifies the SMI based Workload recommendation for academic usage logs. In her work, Cloud package selection based on AHP (Analytic Hierarchical Process) using MCDM (Multi Criteria Decision Making) technique narrates the identification technique of academic user requirements [4]. Academic User Requirements: In an academic scenario, the end users are either student/faculty. Their requirements could be either a request for a virtual machine or a package. The requirements are first checked with SLA (Service Level Agreements). It is defined as an official commitment that prevails between a service provider and a user. Automation of user requirements mainly depends upon the SLA and SMI of a cloud provider. Quality of Service is attained when it satisfies both SLA and SMI. Service Level Agreement (SLA): SLAs offered by service providers as service-based agreement. SLA management consist of the SLA contract definition, SLA negotiation, SLA monitoring, SLA violation detection and SLA enforcement [5]. Service Measurement Index (SMI): The Service Measurement Index (SMI) is a set of business-relevant key performance indicators (KPI’s) that provide standardized method for measuring the services. CSMIC (Cloud Services Measurement Initiative Consortium) develops SMI for measuring services provided by different cloud service providers [6]. Each Service provider has their own SLA. SMI consists of six key metrics such as Accountability, Agility, Assurance of Service, Cost, Performance, Security and Usability [6]. These are further divided into the following factors. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 250 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 3. SMI Key metrics Functions Accountability Auditability, Compliance, data ownership, provider ethicality and sustainability. Agility Elasticity, portability, adaptability and flexibility. Performance Functionality, Service Response time and Accuracy. Assurance Reliability, Resiliency and Service stability. Security Confidentiality, privacy, data integrity and availability. Usability Accessibility, Installability, Learnability, and Operability. Table.1 Functions of SMI key metrics [3][7] Quality of Service (QoS): Quality of Service is attained when a service provider satisfies the user’s requirement. In order to provide an efficient quality of service effective resource management is needed. There are 14 Quality of Service parameters to be considered for evaluation. In which first nine parameters are quantitative and last five parameters are qualitative. S.No QoS parameters 1. Bandwidth (Bw) 2. Computation Capability (CC) 3. Availability (Av) 4. Correctness (Cr) 5. Usability (Us) 6. Reliability (Re) 7. Variable computation load (Vc) 8. Serviceability (Se) 9. Latency (l) 10. Security (S) 11. Portability (P) 12. Reliable storage (Rs) International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 251 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 4. 13. Data Backup (Db) 14. Customization (Cu) Table.2 List of QoS parameters [8] From the above table, the nine quantifiable attributes are calculated as follows [8] [9], 1. Bandwidth: Network bandwidth refers to the number of bits transferred (sent/ received) in a single workload per unit time (usually in seconds). 2. Computational Capacity: Computational capacity corresponds to the ratio between the actual usage time and the expected usage time. 3. Availability: Availability refers to the recovery level of the system in case of failure. 4. Correctness: Correctness defines the degree of accuracy provided to the cloud customers. 5. Usability: Usability refers to the ratio of successful workload operations exhibited by the system. 6. Reliability: Reliability refers to the time taken for the system to recover and operate successfully after a failure. 7. Variable computing load: It is the change in the load balance with respect to time. Calculating the variance of the workload can be used to identify this parameter. 8. Serviceability: Serviceability is the probability of the service being up and running. 9. Latency: Latency is the difference between the workload input and output times. Network Bandwidth=Bits/ second (B/S) Computing Capacity=Actual Usage time of the Resource/Expected Usage time of the Resource. Availability=mean time to failure/ (mean time to failure + mean time to repair) Correctness=total number of failed transmissions/ (total number of failed transmissions + total number of successful transmissions) Usability=no of successful operations in a workload/ (total operations available in the workload) Reliability=mean time to failure + mean time to repair Serviceability= Service Uptime/ (Service Uptime+ Service Downtime) Latency = Time of output produced with respect to that Cloud workload - Time of input in a Cloud workload International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 252 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 5. The last five parameters which are qualitative are calculated based on the user assigned weights of range scale. The user assigns points based on the quality of parameters within a range scale for example user can assign a weight for security within the range from 1-5. Resource Management Management of both physical and virtual resources plays a major role in cloud computing. In order to provide effective cloud services effective resource management is a must. Hypervisor is used in the creation of virtual resources [2]. Hypervisor Hypervisor or virtual machine monitor (VMM) is a computer software, firmware or hardware that creates and runs virtual machines. Host machine is a computer on which a hypervisor runs one or more virtual machines and each virtual machine is called a guest machine. Operating system which runs on the host machine is called as host operating system whereas which runs on the guest machine is called as guest operating system. Hypervisor presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating system [10]. There are two types of hypervisor. They are, Type 1 (or) Baremetal (or) Native Hypervisors It runs directly on the host’s hardware. It runs mostly on the provider side server machines. Eg: Xen, Oracle VM, VMware ESX/ESXi, Microsoft Hyper-V. Figure.1 Type 1 Hypervisors Type 2 (or) Hosted Hypervisors It runs on an operating system just as other computer programs. It runs mostly on the client side machines. Eg: VirtualBox, VMware Workstation, QEMU. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 253 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 6. Figure.2 Type 2 Hypervisors Thus effective resource management deals with one or more of the following ten factors. They are listed below. Table.3 Issues in Effective Management of Resource [2] Resource Provisioning- Allocation of Service provider’s resources to a user. Resource Allocation- Distribution of resources among users or programs. Resource Adaptation- Dynamic adjustment of resources to fulfil the requirements of the user. Resource Mapping- Mapping of the resources available with the provider and required by the user. Resource Modelling- It illustrates the attributes such as states, transitions, inputs and outputs in subsequent time intervals. Resource Estimation- Prior planning of resources required either through guess or calculation. Resource Discovery- Identification of required resource from available resources. Effective Management of Resource Provisioning Allocation Adaptation Mapping Modelling Estimation Discovery Selection Brokering Scheduling International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 254 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 7. Resource Selection- Selecting the best or optimum resource from a pool of available resource. Resource Brokering- Negotiation between the cloud broker and user in order to attain the necessary resource at expected time and within the specified objectives. Resource Scheduling- Sharing resource at certain time bound and occurrence of events at those time interval. Conclusion: Thus effective resource management is essential in a cloud scenario inorder to meet the user’s requirements. In this paper, the terminologies related to cloud resources from the provider and user perspective are narrated in a watertight way. The cloud packages which satisfies the SMI, SLA and QoS parameters are provided as service when required by the user. This paper illustrates the need for effective resource management and it lays a foundation for various research work to be carried out in these criteria in an academic perspective. References: [1] Peter Mell (NIST), Tim Grance (NIST), “The NIST Definition of Cloud Computing”, September 2011 [2] Sunilkumar S et.al, “Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey”, Journal of Network and Computer Applications 41(2014) , PP. 424– 440. [3] Saurabh Kumar Garg,Steve Versteeg and Rajkumar buyya, “ SMICloud: A Framework for comparing and Ranking Cloud Services”, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, PP.210-218. [4] C.Madhumathi, Gopinath Ganapathy, “Cloud Package Selection for Academic Requirements using Multi Criteria Decision Making based Modified Ant Colony Optimization Technique” , Vol 8 No 2 Apr-May 2016, pp.1205-1211. [5] Nie G., E. X., Chen D. (2012) Research on Service Level Agreement in Cloud Computing. In: Hu W. (eds) Advances in Electric and Electronics. Lecture Notes in Electrical Engineering, vol 155. Springer, Berlin, Heidelberg. [6] https://en.wikipedia.org/wiki/Service_Measurement_Index. [7] C.Madhumathi, Gopinath Ganapathy, “ Effective User Requirements Identification and SMI Parameter based WorkLoad Recommendation for Academic Clouds based on Usage logs”, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 6 (2016) pp 4091-4096. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 255 https://sites.google.com/site/ijcsis/ ISSN 1947-5500
  • 8. [8] C.Madhumathi, Gopinath Ganapathy, “Requirement Intensity based Resource Provisioning for e-Learning in Multi-cloud to Avoid Vendor Lock-ins” , volume 11 No.17, September 2016, pp. 1-8. [9] Mohamed Firdhous, Suhaidi Hassan, Osman Ghazali, “A Comprehensive Survey on Quality of Service Implementations in Cloud Computing”, International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013, pp.118-123. [10] Vignesh V, Sendhil Kumar KS, Jaisankar N, “Resource Management and Scheduling in Cloud Environment”, International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013, pp.1-6. [11] Linlin Wu and Rajkumar Buyya, “Service Level Agreement (SLA) in Utility Computing Systems”. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 9, September 2017 256 https://sites.google.com/site/ijcsis/ ISSN 1947-5500