SlideShare a Scribd company logo
1 of 12
PACK: Prediction-Based Cloud Bandwidth and Cost 
Reduction System 
ABSTRACT: 
In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic 
redundancy elimination (TRE) system, designed for cloud computing customers. 
Cloud-based TRE needs to apply a judicious use of cloud resources so that the 
bandwidth cost reduction combined with the additional cost of TRE computation 
and storage would be optimized. PACK’s main advantage is its capability of 
offloading the cloud-server TRE effort to end clients, thus minimizing the 
processing costs induced by the TRE algorithm. Unlike previous solutions, PACK 
does not require the server to continuously maintain clients’ status. This makes 
PACK very suitable for pervasive computation environments that combine client 
mobility and server migration to maintain cloud elasticity. PACK is based on a 
novel TRE technique, which allows the client to use newly received chunks to 
identify previously received chunk chains, which in turn can be used as reliable 
predictors to future transmitted chunks. We present a fully functional PACK 
implementation, transparent to all TCP-based applications and network devices.
Finally, we analyze PACK benefits for cloud users, using traffic traces from 
various sources. 
AIM: 
The main aim of this project is PACK based on a novel TRE technique, 
which allows the client to use newly received chunks to identify previously 
received chunk chains, which in turn can be used as reliable predictors to future 
transmitted chunks. 
SYNOPSIS: 
Cloud computing offers its customers an economical and convenient pay-as-you- 
go service model, known also as usage-based pricing. Cloud customers1 pay 
only for the actual use of computing resources, storage, and bandwidth, according 
to their changing needs, utilizing the cloud’s scalable and elastic computational 
capabilities. In particular, data transfer costs (i.e., bandwidth) is an important issue 
when trying to minimize costs. The cloud customers, applying a judicious use of 
the cloud’s resources, are motivated to use various traffic reduction techniques, in 
particular traffic redundancy elimination (TRE), for reducing bandwidth costs.
Traffic redundancy stems from common end-users’ activities, such as 
repeatedly accessing, downloading, uploading (i.e., backup), distributing, and 
modifying the same or similar information items (documents, data, Web, and 
video). TRE is used to eliminate the transmission of redundant content and, 
therefore, to significantly reduce the network cost. In most common TRE 
solutions, both the sender and the receiver examine and compare signatures of data 
chunks, parsed according to the data content, prior to their transmission. When 
redundant chunks are detected, the sender replaces the transmission of each 
redundant chunk with its strong signature. Commercial TRE solutions are popular 
at enterprise networks, and involve the deployment of two or more proprietary-protocol, 
state synchronized middle-boxes at both the intranet entry points of data 
centers and branch offices, eliminating repetitive traffic between them. 
We present a novel receiver-based end-to-end TRE solution that relies on 
the power of predictions to eliminate redundant traffic between the cloud and its 
end-users. 
EXISTING SYSTEM: 
Traffic redundancy stems from common end-users’ activities, such as repeatedly 
accessing, downloading, uploading (i.e., backup), distributing, and modifying the 
same or similar information items (documents, data, Web, and video). TRE is used 
to eliminate the transmission of redundant content and, therefore, to significantly
reduce the network cost. In most common TRE solutions, both the sender and the 
receiver examine and compare signatures of data chunks, parsed according to the 
data content, prior to their transmission. When redundant chunks are detected, the 
sender replaces the transmission of each redundant chunk with its strong signature. 
Commercial TRE solutions are popular at enterprise networks, and involve the 
deployment of two or more proprietary-protocol, state synchronized middle-boxes 
at both the intranet entry points of data centers. 
DISADVANTAGES OF EXISTING SYSTEM: 
1. Cloud providers cannot benefit from a technology whose goal is to reduce 
customer bandwidth bills, and thus are not likely to invest in one. 
2. The rise of “on-demand” work spaces, meeting rooms, and work-from-home 
solutions detaches the workers from their offices. In such a dynamic work 
environment, fixed-point solutions that require a client-side and a server-side 
middle-box pair become ineffective. 
3. cloud load balancing and power optimizations may lead to a server-side process 
and data migration environment, in which TRE solutions that require full 
synchronization between the server and the client are hard to accomplish or may 
lose efficiency due to lost synchronization
4. Current end-to-end solutions also suffer from the requirement to maintain end-to- 
end synchronization that may result in degraded TRE efficiency. 
PROPOSED SYSTEM: 
In this paper, we present a novel receiver-based end-to-end TRE solution that relies 
on the power of predictions to eliminate redundant traffic between the cloud and its 
end-users. In this solution, each receiver observes the incoming stream and tries to 
match its chunks with a previously received chunk chain or a chunk chain of a 
local file. Using the long-term chunks’ metadata information kept locally, the 
receiver sends to the server predictions that include chunks’ signatures and easy-to-verify 
hints of the sender’s future data. On the receiver side, we propose a new 
computationally lightweight chunking (fingerprinting) scheme termed PACK 
chunking. PACK chunking is a new alternative for Rabin fingerprinting 
traditionally used by RE applications. 
ADVANTAGES OF PROPOSED SYSTEM: 
1. Our approach can reach data processing speeds over3 Gb/s, at least 20% faster 
than Rabin fingerprinting.
2. The receiver-based TRE solution addresses mobility problems common to quasi-mobile 
desktop/ laptops computational environments. 
3. One of them is cloud elasticity due to which the servers are dynamically 
relocated around the federated cloud, thus causing clients to interact with multiple 
changing servers. 
4. We implemented, tested, and performed realistic experiments with PACK within 
a cloud environment. Our experiments demonstrate a cloud cost reduction achieved 
at a reasonable client effort while gaining additional bandwidth savings at the 
client side. 
5. Our implementation utilizes the TCP Options field, supporting all TCP-based 
applications such as Web, video streaming, P2P, e-mail, etc. 
6. We demonstrate that our solution achieves 30% redundancy elimination without 
significantly affecting the computational effort of the sender, resulting in a 20% 
reduction of the overall cost to the cloud customer.
SYSTEM ARCHITECTURE: 
Fig. 1. From stream to chain.
Figure 2- Overview of the PACK implementation. 
MODULES: 
 Receiver Chunk Store 
 Receiver Algorithm 
 Sender Algorithm 
 Wire Protocol 
MODULES DESCRIPTION: 
Receiver Chunk Store
PACK uses a new chains scheme. which chunks are linked to other chunks 
according to their last received order. The PACK receiver maintains a chunk store, 
which is a large size cache of chunks and their associated metadata. Chunk’s 
metadata includes the chunk’s signature and a (single) pointer to the successive 
chunk in the last received stream containing this chunk. Caching and indexing 
techniques are employed to efficiently maintain and retrieve the stored chunks, 
their signatures, and the chains formed by traversing the chunk pointers. 
When the new data are received and parsed to chunks, the receiver computes 
each chunk’s signature using SHA-1. At this point, the chunk and its signature are 
added to the chunk store. In addition, the metadata of the previously received 
chunk in the same stream is updated to point to the current chunk. The 
unsynchronized nature of PACK allows the receiver to map each existing file in 
the local file system to a chain of chunks, saving in the chunk store only the 
metadata associated with the chunks. 
Receiver Algorithm 
Upon the arrival of new data, the receiver computes the respective signature 
for each chunk and looks for a match in its local chunk store. If the chunk’s
signature is found, the receiver determines whether it is a part of a formerly 
received chain, using the chunks’ metadata. If affirmative, the receiver sends a 
prediction to the sender for several next expected chain chunks. Upon a successful 
prediction, the sender responds with a PRED-ACK confirmation message. Once 
the PRED-ACK message is received and processed, the receiver copies the 
corresponding data from the chunk store to its TCP input buffers, placing it 
according to the corresponding sequence numbers. At this point, the receiver sends 
a normal TCP ACK with the next expected TCP sequence number. In case the 
prediction is false, or one or more predicted chunks are already sent, the sender 
continues with normal operation, e.g., sending the raw data, without sending a 
PRED-ACK message. 
Sender Algorithm 
When a sender receives a PRED message from the receiver, it tries to match 
the received predictions to its buffered (yet to be sent) data. For each prediction, 
the sender determines the corresponding TCP sequence range and verifies the hint. 
Upon a hint match, the sender calculates the more computationally intensive SHA- 
1 signature for the predicted data range and compares the result to the signature 
received in the PRED message. Note that in case the hint does not match, a
computationally expansive operation is saved. If the two SHA-1 signatures match, 
the sender can safely assume that the receiver’s prediction is correct. In this case, it 
replaces the corresponding outgoing buffered data with a PRED-ACK message. 
Wire Protocol 
The existing firewalls and minimizes overheads; we use the TCP Options 
field to carry the PACK wire protocol. It is clear that PACK can also be 
implemented above the TCP level while using similar message types and control 
fields. The PACK wire protocol operates under the assumption that the data is 
redundant. First, both sides enable the PACK option during the initial TCP 
handshake by adding a PACK permitted to the TCP Options field. Then, the sender 
sends the (redundant) data in one or more TCP segments, and the receiver 
identifies that a currently received chunk is identical to a chunk in its chunk store. 
The receiver, in turn, triggers a TCP ACK message and includes the prediction in 
the packet’s Options field. Last, the sender sends a confirmation message (PRED-ACK) 
replacing the actual data. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
REFERENCE: 
Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa 
“Privacy-Enhanced Web Service Composition”- IEEE TRANSACTIONS ON 
SERVICES COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2014

More Related Content

What's hot

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGLIM Digital
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390IJMER
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS TechniqueAhmad Atta
 
A Data Transmission Technique Based On RSSI in an Ad-Hoc Network
A Data Transmission Technique Based On RSSI in an Ad-Hoc NetworkA Data Transmission Technique Based On RSSI in an Ad-Hoc Network
A Data Transmission Technique Based On RSSI in an Ad-Hoc NetworkIOSR Journals
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSIJCNCJournal
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
 

What's hot (16)

i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
40520130101004
4052013010100440520130101004
40520130101004
 
Lecture set 1
Lecture set 1Lecture set 1
Lecture set 1
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
VPN Using MPLS Technique
VPN Using MPLS TechniqueVPN Using MPLS Technique
VPN Using MPLS Technique
 
A Data Transmission Technique Based On RSSI in an Ad-Hoc Network
A Data Transmission Technique Based On RSSI in an Ad-Hoc NetworkA Data Transmission Technique Based On RSSI in an Ad-Hoc Network
A Data Transmission Technique Based On RSSI in an Ad-Hoc Network
 
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKSTCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
TCP INCAST AVOIDANCE BASED ON CONNECTION SERIALIZATION IN DATA CENTER NETWORKS
 
3
33
3
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
 

Viewers also liked

PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
 
Architectures For The Cloud
Architectures For The CloudArchitectures For The Cloud
Architectures For The CloudEberhard Wolff
 
WSO2 Stratos 2010 September Workshop
WSO2 Stratos 2010 September WorkshopWSO2 Stratos 2010 September Workshop
WSO2 Stratos 2010 September WorkshopAfkham Azeez
 
Cloud Computing: A New Trend in IT
Cloud Computing: A New Trend in ITCloud Computing: A New Trend in IT
Cloud Computing: A New Trend in ITPutchong Uthayopas
 
Cloud101-Introduction to cloud
Cloud101-Introduction to cloud Cloud101-Introduction to cloud
Cloud101-Introduction to cloud Ranjan Ghosh
 
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...Michael zur Muehlen
 
Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go talemadi
 
Cloud computing doing more with less
Cloud computing doing more with lessCloud computing doing more with less
Cloud computing doing more with lesstalemadi
 
Managing Trade-offs among Architectural Tactics using Feature models and Feat...
Managing Trade-offs among Architectural Tactics using Feature models and Feat...Managing Trade-offs among Architectural Tactics using Feature models and Feat...
Managing Trade-offs among Architectural Tactics using Feature models and Feat...Jaime Chavarriaga
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...Abbie Barbir
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloudInterxion
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computingUlf Mattsson
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapGabe Akisanmi
 
Building Cloud Tools for Netflix
Building Cloud Tools for NetflixBuilding Cloud Tools for Netflix
Building Cloud Tools for NetflixJoe Sondow
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecturemmubashirkhan
 
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales Forecasting
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales ForecastingCloud: Session 7: Cloud Computing, Software as a Service, and Sales Forecasting
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales ForecastingSugarCRM
 

Viewers also liked (20)

PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
Architectures For The Cloud
Architectures For The CloudArchitectures For The Cloud
Architectures For The Cloud
 
WSO2 Stratos 2010 September Workshop
WSO2 Stratos 2010 September WorkshopWSO2 Stratos 2010 September Workshop
WSO2 Stratos 2010 September Workshop
 
Cloud Computing: A New Trend in IT
Cloud Computing: A New Trend in ITCloud Computing: A New Trend in IT
Cloud Computing: A New Trend in IT
 
Cloud101-Introduction to cloud
Cloud101-Introduction to cloud Cloud101-Introduction to cloud
Cloud101-Introduction to cloud
 
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...
Making Things Simpler: How Primitives Help Integrate BPM and Enterprise Archi...
 
Cloud roadmap
Cloud roadmapCloud roadmap
Cloud roadmap
 
Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go Managing A Cloud Environment: How To Get Started And Which Way To Go
Managing A Cloud Environment: How To Get Started And Which Way To Go
 
Cloud computing doing more with less
Cloud computing doing more with lessCloud computing doing more with less
Cloud computing doing more with less
 
Managing Trade-offs among Architectural Tactics using Feature models and Feat...
Managing Trade-offs among Architectural Tactics using Feature models and Feat...Managing Trade-offs among Architectural Tactics using Feature models and Feat...
Managing Trade-offs among Architectural Tactics using Feature models and Feat...
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
Comparative Analysis of SOA and Cloud Computing Architectures using Fact Base...
 
How to move to the cloud
How to move to the cloudHow to move to the cloud
How to move to the cloud
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computing
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmap
 
Building Cloud Tools for Netflix
Building Cloud Tools for NetflixBuilding Cloud Tools for Netflix
Building Cloud Tools for Netflix
 
Multi-tenancy in the cloud
Multi-tenancy in the cloudMulti-tenancy in the cloud
Multi-tenancy in the cloud
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
Multi cloud PaaS
Multi cloud PaaSMulti cloud PaaS
Multi cloud PaaS
 
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales Forecasting
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales ForecastingCloud: Session 7: Cloud Computing, Software as a Service, and Sales Forecasting
Cloud: Session 7: Cloud Computing, Software as a Service, and Sales Forecasting
 

Similar to JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...ASAITHAMBIRAJAA
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPINFOTECH JAYAPRAKASH
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...IEEEGLOBALSOFTTECHNOLOGIES
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemieeepondy
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacentersnexgentechnology
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers acrossnexgentech15
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...Christo Ananth
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...IRJET Journal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingJPINFOTECH JAYAPRAKASH
 
File_Transfer_Protocol_Design
File_Transfer_Protocol_DesignFile_Transfer_Protocol_Design
File_Transfer_Protocol_DesignVishal Vasudev
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 

Similar to JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System (20)

Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Pack: prediction based cloud bandwidth ...
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
An Efficient Cooperative Media Access Control Based Relay Node Selection In W...
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
Networking Articles Overview
Networking Articles OverviewNetworking Articles Overview
Networking Articles Overview
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Mcseminar
McseminarMcseminar
Mcseminar
 
Network assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processingNetwork assisted mobile computing with optimal uplink query processing
Network assisted mobile computing with optimal uplink query processing
 
File_Transfer_Protocol_Design
File_Transfer_Protocol_DesignFile_Transfer_Protocol_Design
File_Transfer_Protocol_Design
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 

More from chennaijp

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...chennaijp
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...chennaijp
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...chennaijp
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...chennaijp
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...chennaijp
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...chennaijp
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networkschennaijp
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...chennaijp
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...chennaijp
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...chennaijp
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...chennaijp
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networkschennaijp
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...chennaijp
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...chennaijp
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...chennaijp
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETschennaijp
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentationchennaijp
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classificationchennaijp
 

More from chennaijp (20)

JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...JPEEE1440   Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...JPN1420   Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...JPN1417  AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
 
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...JPN1416  Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
 
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...JPN1415   R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
 
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411   Secure Continuous Aggregation in Wireless Sensor NetworksJPN1411   Secure Continuous Aggregation in Wireless Sensor Networks
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
 
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...JPN1414   Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
 
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...JPN1413   An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
 
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...JPN1412   Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
 
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...JPN1410  Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
 
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless NetworksJPN1409  Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
 
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...JPN1408  Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
 
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...JPN1406   Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
 
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...JPN1405  RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1410   Images as Occlusions of Textures: A Framework for SegmentationJPM1410   Images as Occlusions of Textures: A Framework for Segmentation
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
 
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407   Exposing Digital Image Forgeries by Illumination Color ClassificationJPM1407   Exposing Digital Image Forgeries by Illumination Color Classification
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
 

Recently uploaded

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 

Recently uploaded (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

  • 1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System ABSTRACT: In this paper, we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would be optimized. PACK’s main advantage is its capability of offloading the cloud-server TRE effort to end clients, thus minimizing the processing costs induced by the TRE algorithm. Unlike previous solutions, PACK does not require the server to continuously maintain clients’ status. This makes PACK very suitable for pervasive computation environments that combine client mobility and server migration to maintain cloud elasticity. PACK is based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. We present a fully functional PACK implementation, transparent to all TCP-based applications and network devices.
  • 2. Finally, we analyze PACK benefits for cloud users, using traffic traces from various sources. AIM: The main aim of this project is PACK based on a novel TRE technique, which allows the client to use newly received chunks to identify previously received chunk chains, which in turn can be used as reliable predictors to future transmitted chunks. SYNOPSIS: Cloud computing offers its customers an economical and convenient pay-as-you- go service model, known also as usage-based pricing. Cloud customers1 pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important issue when trying to minimize costs. The cloud customers, applying a judicious use of the cloud’s resources, are motivated to use various traffic reduction techniques, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs.
  • 3. Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly reduce the network cost. In most common TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, parsed according to the data content, prior to their transmission. When redundant chunks are detected, the sender replaces the transmission of each redundant chunk with its strong signature. Commercial TRE solutions are popular at enterprise networks, and involve the deployment of two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry points of data centers and branch offices, eliminating repetitive traffic between them. We present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. EXISTING SYSTEM: Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly
  • 4. reduce the network cost. In most common TRE solutions, both the sender and the receiver examine and compare signatures of data chunks, parsed according to the data content, prior to their transmission. When redundant chunks are detected, the sender replaces the transmission of each redundant chunk with its strong signature. Commercial TRE solutions are popular at enterprise networks, and involve the deployment of two or more proprietary-protocol, state synchronized middle-boxes at both the intranet entry points of data centers. DISADVANTAGES OF EXISTING SYSTEM: 1. Cloud providers cannot benefit from a technology whose goal is to reduce customer bandwidth bills, and thus are not likely to invest in one. 2. The rise of “on-demand” work spaces, meeting rooms, and work-from-home solutions detaches the workers from their offices. In such a dynamic work environment, fixed-point solutions that require a client-side and a server-side middle-box pair become ineffective. 3. cloud load balancing and power optimizations may lead to a server-side process and data migration environment, in which TRE solutions that require full synchronization between the server and the client are hard to accomplish or may lose efficiency due to lost synchronization
  • 5. 4. Current end-to-end solutions also suffer from the requirement to maintain end-to- end synchronization that may result in degraded TRE efficiency. PROPOSED SYSTEM: In this paper, we present a novel receiver-based end-to-end TRE solution that relies on the power of predictions to eliminate redundant traffic between the cloud and its end-users. In this solution, each receiver observes the incoming stream and tries to match its chunks with a previously received chunk chain or a chunk chain of a local file. Using the long-term chunks’ metadata information kept locally, the receiver sends to the server predictions that include chunks’ signatures and easy-to-verify hints of the sender’s future data. On the receiver side, we propose a new computationally lightweight chunking (fingerprinting) scheme termed PACK chunking. PACK chunking is a new alternative for Rabin fingerprinting traditionally used by RE applications. ADVANTAGES OF PROPOSED SYSTEM: 1. Our approach can reach data processing speeds over3 Gb/s, at least 20% faster than Rabin fingerprinting.
  • 6. 2. The receiver-based TRE solution addresses mobility problems common to quasi-mobile desktop/ laptops computational environments. 3. One of them is cloud elasticity due to which the servers are dynamically relocated around the federated cloud, thus causing clients to interact with multiple changing servers. 4. We implemented, tested, and performed realistic experiments with PACK within a cloud environment. Our experiments demonstrate a cloud cost reduction achieved at a reasonable client effort while gaining additional bandwidth savings at the client side. 5. Our implementation utilizes the TCP Options field, supporting all TCP-based applications such as Web, video streaming, P2P, e-mail, etc. 6. We demonstrate that our solution achieves 30% redundancy elimination without significantly affecting the computational effort of the sender, resulting in a 20% reduction of the overall cost to the cloud customer.
  • 7. SYSTEM ARCHITECTURE: Fig. 1. From stream to chain.
  • 8. Figure 2- Overview of the PACK implementation. MODULES:  Receiver Chunk Store  Receiver Algorithm  Sender Algorithm  Wire Protocol MODULES DESCRIPTION: Receiver Chunk Store
  • 9. PACK uses a new chains scheme. which chunks are linked to other chunks according to their last received order. The PACK receiver maintains a chunk store, which is a large size cache of chunks and their associated metadata. Chunk’s metadata includes the chunk’s signature and a (single) pointer to the successive chunk in the last received stream containing this chunk. Caching and indexing techniques are employed to efficiently maintain and retrieve the stored chunks, their signatures, and the chains formed by traversing the chunk pointers. When the new data are received and parsed to chunks, the receiver computes each chunk’s signature using SHA-1. At this point, the chunk and its signature are added to the chunk store. In addition, the metadata of the previously received chunk in the same stream is updated to point to the current chunk. The unsynchronized nature of PACK allows the receiver to map each existing file in the local file system to a chain of chunks, saving in the chunk store only the metadata associated with the chunks. Receiver Algorithm Upon the arrival of new data, the receiver computes the respective signature for each chunk and looks for a match in its local chunk store. If the chunk’s
  • 10. signature is found, the receiver determines whether it is a part of a formerly received chain, using the chunks’ metadata. If affirmative, the receiver sends a prediction to the sender for several next expected chain chunks. Upon a successful prediction, the sender responds with a PRED-ACK confirmation message. Once the PRED-ACK message is received and processed, the receiver copies the corresponding data from the chunk store to its TCP input buffers, placing it according to the corresponding sequence numbers. At this point, the receiver sends a normal TCP ACK with the next expected TCP sequence number. In case the prediction is false, or one or more predicted chunks are already sent, the sender continues with normal operation, e.g., sending the raw data, without sending a PRED-ACK message. Sender Algorithm When a sender receives a PRED message from the receiver, it tries to match the received predictions to its buffered (yet to be sent) data. For each prediction, the sender determines the corresponding TCP sequence range and verifies the hint. Upon a hint match, the sender calculates the more computationally intensive SHA- 1 signature for the predicted data range and compares the result to the signature received in the PRED message. Note that in case the hint does not match, a
  • 11. computationally expansive operation is saved. If the two SHA-1 signatures match, the sender can safely assume that the receiver’s prediction is correct. In this case, it replaces the corresponding outgoing buffered data with a PRED-ACK message. Wire Protocol The existing firewalls and minimizes overheads; we use the TCP Options field to carry the PACK wire protocol. It is clear that PACK can also be implemented above the TCP level while using similar message types and control fields. The PACK wire protocol operates under the assumption that the data is redundant. First, both sides enable the PACK option during the initial TCP handshake by adding a PACK permitted to the TCP Options field. Then, the sender sends the (redundant) data in one or more TCP segments, and the receiver identifies that a currently received chunk is identical to a chunk in its chunk store. The receiver, in turn, triggers a TCP ACK message and includes the prediction in the packet’s Options field. Last, the sender sends a confirmation message (PRED-ACK) replacing the actual data. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 12.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL REFERENCE: Salah-Eddine Tbahriti, Chirine Ghedira, Brahim Medjahed and Michael Mrissa “Privacy-Enhanced Web Service Composition”- IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 7, NO. 2, APRIL-JUNE 2014