SlideShare a Scribd company logo
1 of 4
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 03 Issue: 01 June 2014 Page No.5-8
ISSN: 2278-2389
5
Devising Framework for Cloud Based Patch to
Optimize the Network Devices
1
Faizal Hajamohideen, 2
Kumaravel
1
Research Scholar Ph.D, Bharath University,
2
Dean & Professor, Department of computer science and Engineering, Bharath University
1
faizal.h@gmail.com, 2
drkumaravel@gmail.com
Abstract - A service discovery of a hybrid network devices are
potentially challenging job for providing quality of services to
the users. Some of the devices held unnoticed and off-handed for
not updating the appropriate driver files. The hybrid device might
alert for notifications but the tragic situation rises to
unavailability of the certain outdated files. It lead the company to
lose timely job or the monetary based lose internally. The
solution to such compatibility issues that cost the quality of
services to the user must be in place. The alternate to the
convincing level isto solve either the problem by technical
support team or to provide cloud based support however the
communication devices on the hybrid network faces many
challenges to ensure the services to the end users. This research
is investing on cloud based services through enhanced patches.
The cloud based patch services endeavored to provide the quality
and optimum services to maintain the hybrid network devices.
This research introduces a framework for the cloud SaaS
integration processand sampling on the real devices to test the
services, the cloud based patch induced whenever the hybrid
network devices are lacking of its updates and the unable to
address the compatibility issues. On the other hand the protocol
analysis is to enable the patch system through the cloud. The
cloud service proposed in this paper is toallow devices to access
patch-update. Also the framework methods were evaluated using
the devices that need services from the hybrid network.
Keywords-Cloud SaaS; Hybrid Network; Devices; Patches;
I. INTRODUCTION
The hybrid network and cloud integration are being inevitably
running to ensure the quality of service. This paper is aimed to
provide solution for the network devices those need a timely
support. The observation, acceptance and service offerings are
care by different applications. In the cloud architecture, the
device fault tare attempted and rectified as SaaS. This paper
focuses the study case of automatic fault detection and
correction by recommending remote patch service on the cloud
architecture as SaaS. It addresses the architecture of the SaaS on
the private cloud and identify the fault using protocol and
attempted to resolve the issues via providing SaaS as a tool. The
patches are released by the cloud based service as and when
required are detected by the cast study and the obtained results
along with the protocols described as part of this paper. The
discussions from various researchers addressed and
recommended the solution for the devices that are used in the
hybrid network. This section addressed in terms of patch
services, in hunt of increased user’s productivity and the usage of
hybrid network need a variety ofcommunication services and
need a dedicated devices [1]. The support of patch is defined in
acomplex distributed applications is even more challenging than
standalone applications[2]. The architecture of the SaaS on the
private cloud and identify the fault using protocol and attempted
to resolve the issues via providing SaaS as a tool [3].There is
lack ofstandardization among different enterprise customers, and
finally testing the applications [4]It is proposed framework to
upgrade a distributed application in astage manner to
significantly reduce upgrade overhead [5]. Further explored the
problem of mixed mode where multiple versions of an
application canoperate concurrently during the upgrade process
[6]. The increasing aggregate bandwidth demand could be
alleviated, but not solved, by using a fat tree network layout
[7].This research expresses the solution that comprises all
patching of complex applications is beyond the scope.This paper
stresses that the patch Management is a practice designed to
proactively prevent the devices lacking from updates. The patch
implementation result is to reduce the time and money spent
dealing with new devices since the existing one in good
condition. The study and experiment discussed in this paper
created in a sustainable environment where hybrid network is
being activelyused. The causes for the required updates by the
devices are triggered and resulted by identified errors analyzing
protocols. The following section discusses the experimental test-
bed and the flow of patch from client to server that resides in the
cloud server where patches are applicable.
II. ENVIRONMENT
A. The Core Topology
The core topology designed and configured for the experiment
using the real time high end cisco devices, such as the Multi-
layer Switch C3750 with IOS SoftwareC3750-IPBASE-M,
Version 12.2(25), ROM Bootstrap 3750 Boot Loader C3750-
HBOOT-M, Processor WS-C3750G-24PS (PowerPC405),
Processor board ID FOC1041Y13Z with 118784K/12280K bytes
of memory; the Switch C2960 with IOS Software C2960-
LANBASE-M, Version 12.2(25), 62720K bytes of ATA
CompactFlash (Read/Write), DRAM configuration is 64 bits
wide with parity enabled. These devices are interconnected using
UTP CAT-6 CABLES. The PuTTY is used for consoling the
router and switches via management interfaces. PuTTY is a free
and open source terminal emulator application which can act as a
client for the SSH, Telnet, rlogin, and raw TCP computing
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 03 Issue: 01 June 2014 Page No.5-8
ISSN: 2278-2389
6
protocols and as a serial console client for the cisco router and
switches .
B. Cloud SaaS Architectureenvironment
The cloud architecture comprises VM clients and the advanced
Ubuntu enterprise cloud components that run on eucalyptus
software. The model derived for observing the STP behavior
across the cloud infrastructure. The following sections describe
the components of the architecture shown in the Fig 1.The Node
Controller (NC), A Ubuntu Enterprise Cloud(UEC) node is a
Virtual Terminal aided server capable of running Kernel based
Virtual Machine(KVM) as the hypervisor. UEC automatically
installs KVM when the user elects to install the UEC node. The
VMs running on the hypervisor and controlled by UEC are called
instances. Node Controller (NC), The basic functions of NC is to
collect data related to the resource availability and utilization on
the node and reporting the data to Cluster Controller and Instance
life cycle managementNode Controller runs on each node and
controls the life cycle of instances running on the node. The NC
interacts with the OS and the hypervisor running on the node on
one side and the Cluster Controller (CC) on the other side. NC
queries the Operating System running on the node to discover the
node's physical resources the number of cores, the size of
memory, the available disk space and also to learn about the state
of VM instances running on the node and propagates this data up
to the CC.Cluster Controller (CC) is to receive requests from
CLC(Cloud Controller) to deploy instances, decide which NCs
to use for deploying the instances on, to control the virtual
network available to the instances and to collect information
about the NCs registered with it and report it,CC manages one or
more Node Controllers and deploys/manages instances on them.
CC also manages the networking for the instances running on the
Nodes. CC communicates with Cloud Controller (CLC) on one
side and NCs on the other side.
The Cloud Controller (CLC), it Monitors the availability of
resources on various components of the cloud infrastructure,
including hypervisor nodes that are used to provision the
instances and the cluster controllers that manage the hypervisor
nodes. Also CLC is the front end to the entire cloud
infrastructure.CLC provides web services interface to the client
tools on one side and interacts with the rest of the components of
the Eucalyptus infrastructure on the other side it does resource
arbitration deciding which clusters will be used for provisioning
the instances[8].Storage Controller (SC), it provides persistent
block storage for use by the instances. Walrus Storage Controller
(WS3), WS3 provides a persistent simple storage service.The
major functions are Storing the machine images and Storing
snapshots using S3 API[8].Multilayer Switches Layer-3 VLAN,
it divide switches logically into required functions and allows
STP runs to avoid logical loops. The Layer -3 switch interfaces
avoid router to a switch to perform inter-VLAN routing. The
Catalyst 3950 series switch supports inter-VLAN routing by
integrating the routing and multilayer series switch[9].
C. SaaS patch process block
Fig .2 Shows the process block of SaaS based patch system and
the Fig.3 shows the device monitor and whenever the device
required a patch that will be delivered by the patch server. The
entire process is been explained in the following section,
D. Mechanism of Cloud based batch service
 Agent To Scan the Network
 Send the Patch request if necessary
 Device gets patch installation from the Admin User
 On a scheduled interval, the patch server retrieves
updated patch management data
 The SaaS and Notification Server retrieve the related
patch installation files for the client device as a
repository
 Patch Advertisement. The central server advertises the
patch to the managed nodes through intermediary
package distribution servers
 The managed nodes check in with the central server and
download the patch from the appropriate location
 The agent installs the patches at a predetermined time
and reboots the node if necessary
 On a repeating schedule, the agents gather and upload
current vulnerability data to the central server
Table 1. Device Error Report and MAC Addresses
List of Patches request and error
manifest
Device Address
1 Printer driver error 1c-c6-3c-a2-26-80
2 Requst time out 44-6d-57-2c-02-f3
3 Device not reachable f4-6d-57-2c-19-26
4 Device Unknown message from
the client
5f-6r-e7-1a-c2-36
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 03 Issue: 01 June 2014 Page No.5-8
ISSN: 2278-2389
7
Figure 1. The SSDP protocols used by the devices
III. FINDINGS
The overall experimental setup yields the results of hybrid
network devices and its impact on the network. Also the result
showed need of patch that required dispatching on time through
cloud based SaaS. The table-1 shows the devices that are waiting
for the patches to be updated through the cloud based SaaS. The
framework has well evolved through experiment and the protocol
observations are depicted in the table.2 below.
The protocol SSDP (Simple Service Discovery Protocol) is
significant as the devices are expectingpatch update from the
server. The Fig 4 also indicated from the table 2. The Fig 4 also
shows the SSDP’s elevation on the network and the patch server
required processing the necessary patch to provide the services to
the devices.
A Research limitations
Theexperiments are done on real sustainable devices with
restricted administrative privileges. Furthermore the patch
mechanism with some ideal assumptions is included. This
experiment needed improvement through more admin privileges
and support that could yield better result.
IV. CONCLUSIONS
The patch advertisement is noticed in the server side. Also the
device required updated patch are monitored. The server
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 03 Issue: 01 June 2014 Page No.5-8
ISSN: 2278-2389
8
result outputs are evaluated using the framework defined in the
patch. The SaaS process is used for the experimental purposes
also convincingly adopted.This research is believed to be the first
patch methods to support cloud based patch services to the off-
handed devices.The network management protocols such as
SSDP are identified in this study have performed the amble work
to identify the device patch requirement. The framework has
been devised for patch and dispatched to the destination devices.
The quality of services is achieved through providing the user the
optimal services. The data collected in the network clearly justify
that the hybrid network require the external cloud based patch
services.
REFERENCES
[1] Patch Management Best Practices, Online
ArticleURL http://www.symantec.com/docs/HOWTO3124
[2] O. Crameri, N. Knezvic, D. Kostic, R. Bianchini, and W. Zwaenepoel.
Staged deployment in Mirage: an integrated Softwareupgrade testing and
distribution system. In Symposium on Operating Systems Principles, Oct,
2007
[3] Faizal Hajamohideen, Dr.Kumaravel, Study on Network Device Fault
Tolerance and Optimization as SaaS,International Journal of Data Mining
Techniques and Applications(IJDMTA) , ISSN: 2278-2419, Vol 02, Issue
01,June 2013.
[4] Hai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, Madhu Sudhan
KN, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran Patch
Management Automationfor Enterprise Cloud,IBM TJ Watson Research
Center. IBM GlobalTechnology Services
[5] Dumitras, P. Narasimhan, E. Tilevich. To Upgrade or Not to Upgrade:
Impact of Online Upgrades across Multiple Administrative Domains.
Onward, Oct, 2010.
[6] M. E. Segal and O. Frieder. Dynamically updating distributed software:
supporting change in uncertain and mistrustful environments. In IEEE
Conference on Software Maintenance, Oct, 1989.
[7] J. Leitão, J. Pereira, and L. Rodrigues. Hyparview: A membership protocol
for reliable gossip-based broadcast. Inroceedings of the 37th Annual
IEEE/IFIP International Conference on Dependable Systems and Networks,
pages
419–428.IEEE Computer Society, 2007.
[8] Johnson D, Kiran Murari, Murthy Raju, Suseendran RB, Yogesh
GirikumarEucalyptus, Eucalyptus Beginner's Guide – UEC, Edition
(Ubuntu Server 10.04 - Lucid Lynx), v1.0, 25 May 2010.
[9] Configuring Layer 3 Interfaces, Cisco online
document,http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/
12.2/25ew/configuration/guide/l3_int.pdf
[10] Faizal Hajamohideen, Dr.Kumaravel, Device Utilization and Optimization
of Hybrid Network: An Approach to a Cloud Based Service, The 2nd
International Conference on Applied Information and Communications
Technology" - ICAICT 2014, April 29, 2014.

More Related Content

Similar to Devising Framework for Cloud Based Patch to Optimize the Network Devices

AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEIRJET Journal
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridadMarketing Donalba
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeYogeshIJTSRD
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networkingsaigandham1
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Journals
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudeSAT Publishing House
 
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...IRJET Journal
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGIRJET Journal
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of RobotiumSusan Tullis
 
An Investigation into Convergence of Networking and Storage Solutions
An Investigation into Convergence of Networking and Storage Solutions An Investigation into Convergence of Networking and Storage Solutions
An Investigation into Convergence of Networking and Storage Solutions Blesson Babu
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containersprashant desai
 
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTING
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTINGLIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTING
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTINGcsandit
 

Similar to Devising Framework for Cloud Based Patch to Optimize the Network Devices (20)

AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDDYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUD
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
Virtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloudVirtual appliance creation and optimization in cloud
Virtual appliance creation and optimization in cloud
 
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
A Host Selection Algorithm for Dynamic Container Consolidation in Cloud Data ...
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING
 
Disadvantages Of Robotium
Disadvantages Of RobotiumDisadvantages Of Robotium
Disadvantages Of Robotium
 
An Investigation into Convergence of Networking and Storage Solutions
An Investigation into Convergence of Networking and Storage Solutions An Investigation into Convergence of Networking and Storage Solutions
An Investigation into Convergence of Networking and Storage Solutions
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containers
 
En35793797
En35793797En35793797
En35793797
 
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTING
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTINGLIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTING
LIVE VIRTUAL MACHINE MIGRATION USING SHADOW PAGING IN CLOUD COMPUTING
 

More from ijbuiiir1

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...ijbuiiir1
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networksijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeijbuiiir1
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 

More from ijbuiiir1 (20)

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBee
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 

Recently uploaded

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 

Recently uploaded (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 

Devising Framework for Cloud Based Patch to Optimize the Network Devices

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 03 Issue: 01 June 2014 Page No.5-8 ISSN: 2278-2389 5 Devising Framework for Cloud Based Patch to Optimize the Network Devices 1 Faizal Hajamohideen, 2 Kumaravel 1 Research Scholar Ph.D, Bharath University, 2 Dean & Professor, Department of computer science and Engineering, Bharath University 1 faizal.h@gmail.com, 2 drkumaravel@gmail.com Abstract - A service discovery of a hybrid network devices are potentially challenging job for providing quality of services to the users. Some of the devices held unnoticed and off-handed for not updating the appropriate driver files. The hybrid device might alert for notifications but the tragic situation rises to unavailability of the certain outdated files. It lead the company to lose timely job or the monetary based lose internally. The solution to such compatibility issues that cost the quality of services to the user must be in place. The alternate to the convincing level isto solve either the problem by technical support team or to provide cloud based support however the communication devices on the hybrid network faces many challenges to ensure the services to the end users. This research is investing on cloud based services through enhanced patches. The cloud based patch services endeavored to provide the quality and optimum services to maintain the hybrid network devices. This research introduces a framework for the cloud SaaS integration processand sampling on the real devices to test the services, the cloud based patch induced whenever the hybrid network devices are lacking of its updates and the unable to address the compatibility issues. On the other hand the protocol analysis is to enable the patch system through the cloud. The cloud service proposed in this paper is toallow devices to access patch-update. Also the framework methods were evaluated using the devices that need services from the hybrid network. Keywords-Cloud SaaS; Hybrid Network; Devices; Patches; I. INTRODUCTION The hybrid network and cloud integration are being inevitably running to ensure the quality of service. This paper is aimed to provide solution for the network devices those need a timely support. The observation, acceptance and service offerings are care by different applications. In the cloud architecture, the device fault tare attempted and rectified as SaaS. This paper focuses the study case of automatic fault detection and correction by recommending remote patch service on the cloud architecture as SaaS. It addresses the architecture of the SaaS on the private cloud and identify the fault using protocol and attempted to resolve the issues via providing SaaS as a tool. The patches are released by the cloud based service as and when required are detected by the cast study and the obtained results along with the protocols described as part of this paper. The discussions from various researchers addressed and recommended the solution for the devices that are used in the hybrid network. This section addressed in terms of patch services, in hunt of increased user’s productivity and the usage of hybrid network need a variety ofcommunication services and need a dedicated devices [1]. The support of patch is defined in acomplex distributed applications is even more challenging than standalone applications[2]. The architecture of the SaaS on the private cloud and identify the fault using protocol and attempted to resolve the issues via providing SaaS as a tool [3].There is lack ofstandardization among different enterprise customers, and finally testing the applications [4]It is proposed framework to upgrade a distributed application in astage manner to significantly reduce upgrade overhead [5]. Further explored the problem of mixed mode where multiple versions of an application canoperate concurrently during the upgrade process [6]. The increasing aggregate bandwidth demand could be alleviated, but not solved, by using a fat tree network layout [7].This research expresses the solution that comprises all patching of complex applications is beyond the scope.This paper stresses that the patch Management is a practice designed to proactively prevent the devices lacking from updates. The patch implementation result is to reduce the time and money spent dealing with new devices since the existing one in good condition. The study and experiment discussed in this paper created in a sustainable environment where hybrid network is being activelyused. The causes for the required updates by the devices are triggered and resulted by identified errors analyzing protocols. The following section discusses the experimental test- bed and the flow of patch from client to server that resides in the cloud server where patches are applicable. II. ENVIRONMENT A. The Core Topology The core topology designed and configured for the experiment using the real time high end cisco devices, such as the Multi- layer Switch C3750 with IOS SoftwareC3750-IPBASE-M, Version 12.2(25), ROM Bootstrap 3750 Boot Loader C3750- HBOOT-M, Processor WS-C3750G-24PS (PowerPC405), Processor board ID FOC1041Y13Z with 118784K/12280K bytes of memory; the Switch C2960 with IOS Software C2960- LANBASE-M, Version 12.2(25), 62720K bytes of ATA CompactFlash (Read/Write), DRAM configuration is 64 bits wide with parity enabled. These devices are interconnected using UTP CAT-6 CABLES. The PuTTY is used for consoling the router and switches via management interfaces. PuTTY is a free and open source terminal emulator application which can act as a client for the SSH, Telnet, rlogin, and raw TCP computing
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 03 Issue: 01 June 2014 Page No.5-8 ISSN: 2278-2389 6 protocols and as a serial console client for the cisco router and switches . B. Cloud SaaS Architectureenvironment The cloud architecture comprises VM clients and the advanced Ubuntu enterprise cloud components that run on eucalyptus software. The model derived for observing the STP behavior across the cloud infrastructure. The following sections describe the components of the architecture shown in the Fig 1.The Node Controller (NC), A Ubuntu Enterprise Cloud(UEC) node is a Virtual Terminal aided server capable of running Kernel based Virtual Machine(KVM) as the hypervisor. UEC automatically installs KVM when the user elects to install the UEC node. The VMs running on the hypervisor and controlled by UEC are called instances. Node Controller (NC), The basic functions of NC is to collect data related to the resource availability and utilization on the node and reporting the data to Cluster Controller and Instance life cycle managementNode Controller runs on each node and controls the life cycle of instances running on the node. The NC interacts with the OS and the hypervisor running on the node on one side and the Cluster Controller (CC) on the other side. NC queries the Operating System running on the node to discover the node's physical resources the number of cores, the size of memory, the available disk space and also to learn about the state of VM instances running on the node and propagates this data up to the CC.Cluster Controller (CC) is to receive requests from CLC(Cloud Controller) to deploy instances, decide which NCs to use for deploying the instances on, to control the virtual network available to the instances and to collect information about the NCs registered with it and report it,CC manages one or more Node Controllers and deploys/manages instances on them. CC also manages the networking for the instances running on the Nodes. CC communicates with Cloud Controller (CLC) on one side and NCs on the other side. The Cloud Controller (CLC), it Monitors the availability of resources on various components of the cloud infrastructure, including hypervisor nodes that are used to provision the instances and the cluster controllers that manage the hypervisor nodes. Also CLC is the front end to the entire cloud infrastructure.CLC provides web services interface to the client tools on one side and interacts with the rest of the components of the Eucalyptus infrastructure on the other side it does resource arbitration deciding which clusters will be used for provisioning the instances[8].Storage Controller (SC), it provides persistent block storage for use by the instances. Walrus Storage Controller (WS3), WS3 provides a persistent simple storage service.The major functions are Storing the machine images and Storing snapshots using S3 API[8].Multilayer Switches Layer-3 VLAN, it divide switches logically into required functions and allows STP runs to avoid logical loops. The Layer -3 switch interfaces avoid router to a switch to perform inter-VLAN routing. The Catalyst 3950 series switch supports inter-VLAN routing by integrating the routing and multilayer series switch[9]. C. SaaS patch process block Fig .2 Shows the process block of SaaS based patch system and the Fig.3 shows the device monitor and whenever the device required a patch that will be delivered by the patch server. The entire process is been explained in the following section, D. Mechanism of Cloud based batch service  Agent To Scan the Network  Send the Patch request if necessary  Device gets patch installation from the Admin User  On a scheduled interval, the patch server retrieves updated patch management data  The SaaS and Notification Server retrieve the related patch installation files for the client device as a repository  Patch Advertisement. The central server advertises the patch to the managed nodes through intermediary package distribution servers  The managed nodes check in with the central server and download the patch from the appropriate location  The agent installs the patches at a predetermined time and reboots the node if necessary  On a repeating schedule, the agents gather and upload current vulnerability data to the central server Table 1. Device Error Report and MAC Addresses List of Patches request and error manifest Device Address 1 Printer driver error 1c-c6-3c-a2-26-80 2 Requst time out 44-6d-57-2c-02-f3 3 Device not reachable f4-6d-57-2c-19-26 4 Device Unknown message from the client 5f-6r-e7-1a-c2-36
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 03 Issue: 01 June 2014 Page No.5-8 ISSN: 2278-2389 7 Figure 1. The SSDP protocols used by the devices III. FINDINGS The overall experimental setup yields the results of hybrid network devices and its impact on the network. Also the result showed need of patch that required dispatching on time through cloud based SaaS. The table-1 shows the devices that are waiting for the patches to be updated through the cloud based SaaS. The framework has well evolved through experiment and the protocol observations are depicted in the table.2 below. The protocol SSDP (Simple Service Discovery Protocol) is significant as the devices are expectingpatch update from the server. The Fig 4 also indicated from the table 2. The Fig 4 also shows the SSDP’s elevation on the network and the patch server required processing the necessary patch to provide the services to the devices. A Research limitations Theexperiments are done on real sustainable devices with restricted administrative privileges. Furthermore the patch mechanism with some ideal assumptions is included. This experiment needed improvement through more admin privileges and support that could yield better result. IV. CONCLUSIONS The patch advertisement is noticed in the server side. Also the device required updated patch are monitored. The server
  • 4. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 03 Issue: 01 June 2014 Page No.5-8 ISSN: 2278-2389 8 result outputs are evaluated using the framework defined in the patch. The SaaS process is used for the experimental purposes also convincingly adopted.This research is believed to be the first patch methods to support cloud based patch services to the off- handed devices.The network management protocols such as SSDP are identified in this study have performed the amble work to identify the device patch requirement. The framework has been devised for patch and dispatched to the destination devices. The quality of services is achieved through providing the user the optimal services. The data collected in the network clearly justify that the hybrid network require the external cloud based patch services. REFERENCES [1] Patch Management Best Practices, Online ArticleURL http://www.symantec.com/docs/HOWTO3124 [2] O. Crameri, N. Knezvic, D. Kostic, R. Bianchini, and W. Zwaenepoel. Staged deployment in Mirage: an integrated Softwareupgrade testing and distribution system. In Symposium on Operating Systems Principles, Oct, 2007 [3] Faizal Hajamohideen, Dr.Kumaravel, Study on Network Device Fault Tolerance and Optimization as SaaS,International Journal of Data Mining Techniques and Applications(IJDMTA) , ISSN: 2278-2419, Vol 02, Issue 01,June 2013. [4] Hai Huang, Salman Baset, Chunqiang Tang, Ashu Gupta, Madhu Sudhan KN, Fazal Feroze, Rajesh Garg, Sumithra Ravichandran Patch Management Automationfor Enterprise Cloud,IBM TJ Watson Research Center. IBM GlobalTechnology Services [5] Dumitras, P. Narasimhan, E. Tilevich. To Upgrade or Not to Upgrade: Impact of Online Upgrades across Multiple Administrative Domains. Onward, Oct, 2010. [6] M. E. Segal and O. Frieder. Dynamically updating distributed software: supporting change in uncertain and mistrustful environments. In IEEE Conference on Software Maintenance, Oct, 1989. [7] J. Leitão, J. Pereira, and L. Rodrigues. Hyparview: A membership protocol for reliable gossip-based broadcast. Inroceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 419–428.IEEE Computer Society, 2007. [8] Johnson D, Kiran Murari, Murthy Raju, Suseendran RB, Yogesh GirikumarEucalyptus, Eucalyptus Beginner's Guide – UEC, Edition (Ubuntu Server 10.04 - Lucid Lynx), v1.0, 25 May 2010. [9] Configuring Layer 3 Interfaces, Cisco online document,http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/ 12.2/25ew/configuration/guide/l3_int.pdf [10] Faizal Hajamohideen, Dr.Kumaravel, Device Utilization and Optimization of Hybrid Network: An Approach to a Cloud Based Service, The 2nd International Conference on Applied Information and Communications Technology" - ICAICT 2014, April 29, 2014.