SlideShare a Scribd company logo
1 of 3
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 02 December 2012 Page No.25-27
ISSN: 2278-2389
25
Virtualized Web Desktop
Towards A Faster Web Cloud Operating System
Bittu Daimary,Mahesh Chettri,Amina Sultana
MCA 6th semester, St. Anthony’s College,Shillong, Meghalaya
Email:bittudaimary@gmail.com,mahesh.chetri@gmail.com,amina.sultana@hotmail.com
Abstract- All Operating Systems provide interface to users and
inherent applications running on a system. Today with the
advancement in the field of cloud computing, its services are in
high demand. The Cloud is becoming an active paradigm of
computation through services. However, such services do not
prove to be very efficient in slow networks. Thus, the paper
intends to achieve faster response of services provided by the
Cloud infrastructure through the use of a new mechanism of
servicing client requests. The focus of the paper is to realize most
operating system functions at the client side over the Cloud
infrastructure using the virtualization technique. It also proposes
to overcome the issues present in the current infrastructure
service and resulting in a faster service.
Keywords-cloud operating system; cloud computing
I. INTRODUCTION
An operating system (OS) is a software program that manages
the hardware and software resources of a computer. The OS
performs basic tasks, such as controlling and allocating memory,
prioritizing the processing of instructions, controlling input and
output devices, facilitating networking, and managing files [1].
The features of the operating systems are totally dependent on
the type of software. Every operating system differs from each
other in some features while there are some features which are
common in all operating systems. Some of the features of the
operating systems are listed below: [2].
Operating System
Software and hardware management
The operating system is the bridge between computer hardware
and software and makes the communication between them
possible. Also communication between different softwares in the
computer is also taken care by operating system [2].
Constant API
Application Program Interface (API) is a software that allows
different applications that run on a computer to work on other
computers also. But they should have same operating system. So
it is very vital to have consistent API in the operating system [2].
Execution Of Programs
Programs running in the computer are completely dependent on
the operating system. But program execution is a difficult
process. The multitasking and multithreading features of the
operating system are dependent upon the type of program
execution feature of OS [2].
Interruptions
Interruption may happen at anytime while using the computers.
The operating system allows and handles many numbers of
interrupts. Whenever an interruption occurs, the operating system
responds to it by saving and stopping the current execution and
works on the new execution. This is the most hard-hitting
process for the operating system [2].
Managing Memory
The operating system provides the memory for the programs that
are executed at any moment. So the operating system should
have good memory allocation facility to execute the programs
smoothly. The prioritization and allocation of memory to the
applications running should be taken care by the operating
systems [2].
Networking
The operating system makes it possible for one computer to
communicate with other computers in a network [2].
Security
An operating system in the computer takes care of all security
issues of computer and data in it. Login passwords, firewall
settings, and every such aspect related to security depends on the
ability of the operating system. Some of the computers in
network may involve in file sharing, and other data sharing.
Hence, it becomes vital to have powerful secured operating
systems [2].
Cloud Computing
Cloud computing is a term that describes the means of delivering
any and all Information Technology – from computing power to
computing infrastructure, applications, business processes and
personal collaboration – to end users as a service wherever and
whenever they need it [3].The cloud in cloud computing is the set
of hardware, software, networks, storage, services, and interfaces
that combine to deliver aspects of computing as a service. Shared
resources, softwares and information are provided to computers
and other devices on demand. It allows people to do things they
want to do on a computer without the need for them to buy and
build an IT infrastructure or to understand the underlying
technology [3].The reason behind the adoption of cloud
computing over other IT deployments is flexibility, scalability,
rapid provisioning, reliability, stability and green solutions
[3].There are different kinds of cloud deployment models which
provide different kinds of services and are classified into four
types:
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 02 December 2012 Page No.25-27
ISSN: 2278-2389
26
Public Cloud
In Public cloud the computing infrastructure is hosted by the
cloud vendor at the vendor’s premises. The customer has no
visibility and control over where the computing infrastructure is
hosted. The computing infrastructure is shared between any
organizations [4].
Private Cloud
The computing infrastructure is dedicated to a particular
organization and not shared with other organizations. Some
experts consider that private clouds are not real examples of cloud
computing. Private clouds are more expensive and more secure
when compared to public clouds.Private clouds are of two types:
On-premise private clouds and externally hosted private clouds.
Externally hosted private clouds are also exclusively used by one
organization, but are hosted by a third party specializing in cloud
infrastructure. Externally hosted private clouds are cheaper than
On-premise private clouds [4].
Hybrid Cloud
Organizations may host critical applications on private clouds and
applications with relatively less security concerns on the public
cloud. The usage of both private and public clouds together is
called hybrid cloud. A related term is Cloud Bursting. In Cloud
bursting organization use their own computing infrastructure for
normal usage, but access the cloud for high/peak load
requirements. This ensures that a sudden increase in computing
requirement is handled gracefully [4].
Community Cloud
Community cloud involves sharing of computing infrastructure in
between organizations of the same community. For example all
Government organizations within the state of California may
share computing infrastructure on the cloud to manage data
related to citizens residing in California [4].
The different types of Cloud Services are:
1) Infrastructure As A Service(Iaas)
The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing
resources where the consumer is able to deploy and run arbitrary
software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage, and
deployed applications; and possibly limited control of select
networking components (e.g., host firewalls)[5].
2) Platform As A Service(PaaS)
The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer-created or acquired applications
created using programming languages, libraries, services, and
tools supported by the provider. The consumer does not manage
or control the underlying cloud infrastructure including network,
servers, operating systems, or storage, but has control over the
deployed applications and possibly configuration settings for the
application-hosting environment [5].
3)Software As A Service(SaaS)
The capability provided to the consumer is to use the provider’s
applications running on a cloud infrastructure2. The applications
are accessible from various client devices through either a thin
client interface, such as a web browser (e.g., web-based email), or
a program interface. The consumer does not manage or control
the underlying cloud infrastructure including network, servers,
operating systems, storage, or even individual application
capabilities, with the possible exception of limited user-specific
application configuration settings [5].
Cloud Operating System
Cloud Operating System is one of the interesting features of
Cloud Computing. Cloud Operating System can be treated as
Platform as a Service. Any operating system can be placed in
cloud and it can be accessed from any local machine having the
feel of running the Operating System locally. But in the current
implementation of cloud Operating System, a mouse or keyboard
event is sent by the client to the Operating System residing in the
cloud. This OS performs operations on the events received and
responds with a corresponding output to the client. If an event
occurs requiring to change something on the screen (For e.g.
creating a window), the OS residing in the cloud creates an
image of the screen and sends it to the client as an output. If such
an event occurs frequently, huge amount of images would be sent
by the Cloud Operating System to the client; which proves to be
not very efficient if the bandwidth of the internet is not high.
II.THE PROPOSED SYSTEM
To overcome the problem described above, a model called
Virtualized Web Desktop is proposed. Below is the pictorial
description of the proposed model:
Basic architecture of Virtualized Web Desktop
Interaction via Output
Interrupt displayed
Client Message Server Message
CLIENT (Packet Message)
---------------------------------------------------------------------------------------
SERVER
Browser
Web Client OS
Web Request Handler
Operating System
Create Message
Create Display
Request Interceptor
Trigger Event
Web Window
Integrated Intelligent Research (IIR) International Journal of Web Technology
Volume: 01 Issue: 02 December 2012 Page No.25-27
ISSN: 2278-2389
27
Virtualized Web Desktop
Virtualized Web Desktop is a modification of Cloud Operating
System which can be placed in the cloud and can be accessed
from any local machine using only a browser in a much faster
way. The components which will be required for proper
functioning of Virtualized Web Desktop are:
Browser
Browser acts as a platform for users to interact with the
Operating System residing in the cloud.
Web Client OS
Web Client OS runs in the client side which can be purely
written in Javascript. Web Client OS have two main functions:
Create Message
Create Message interprets the click or keypress event triggered
by any application running in the browser. A packet message
corresponding to this event is created and is then send to the
server using http/https protocols. This packet message is a
message carrier which is used to carry information between two
ends. Packet Message carries two types of messages. They are:
Client Message
Client Message is used for sending event triggered information to
the Server. Along with it, it holds other relative information
about the event.
Server Message:
Server Message is basically a command and other corresponding
data required to fulfill the requested event. This message is
generated from the processing done in the server side Operating
System. This message is then send to the client.
Create Display
The main functionality of Create Display is to receive a
command and other relevant data from the server, perform
operations based on the command specified and finally
presenting the output requested for. For e.g. if it receives a
command to create window, it creates window using HTML and
performs the changes on the DOM structure as per required to
display the window on the screen.
Web Request Handler
Web Request Handler runs in the server side. It is an application
running on top of Operating System which is in the cloud.The
functionality provided by Web Request Handler is:
Request Interceptor:
It intercepts the request send by the client (i.e. Client Message)
and extracts the information about which application invoked the
event, what is the type of event and other information related to
it.
Trigger Event:
It triggers event in the Operating System residing in the Cloud
for a particular application specified in Client Message. This OS
residing in the cloud then handles the event and performs the
required operation similar to what any normal Operating System
intends to do.
Web Window:
It is the replacement of the GUI creation (like XWindow System)
component present in the actual OS in the cloud. Web Window
component uses the generalized set of commands and performs
the necessary functioning corresponding to the commands
invoked. This information is then passed on to the client via
server message. Thus, the actual creation of the interface is done
on the client side. (Web Client OS with the aid of Create Display.
Unlike in the existing cloud OS where images are being passed
every time.)
III.CONCLUSION
The idea presented here is the change in the protocol in which the
communication between thin clients and servers takes place in a
cloud OS. The proposed system uses protocols in the form of
commands which helps thin clients in GUI creation. The use of
commands makes the load lighter in the network thus providing
faster servicing. On the part of the client it requires only a small
processing for interpreting the command and providing the GUI
interface. Thus, leading to a better performance in service.
REFERENCES
[1] OperatingSystem,http://gama.vtu.lt/biblioteka/Operating_systems/Operating
_systems.pdf,2012
[2] Features of OS, http://computersecuritycrew.com/features_of_os.php, 2012
[3] Dr. Kumar Saurabh, “Cloud Computing-Insights into New-Era
Infrastructure”, New Delhi, Wiley India Private Limited, 2011
[4] Cloud computing tutorail, http://thecloudtutorial.com, 2012
[5] NIST definition of cloud services,
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2012
[6] Barrie Sosinky, “Cloud Computing Bible”, New Delhi, Wiley India Private
Limited,2011

More Related Content

Similar to Virtualized Web Desktop Towards Faster Cloud OS

A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.Minor33
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksijcsa
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSijujournal
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxPARTHO KUMAR SAHA
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxojaswiniwagh
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 

Similar to Virtualized Web Desktop Towards Faster Cloud OS (20)

G017324043
G017324043G017324043
G017324043
 
A revolution in information technology cloud computing.
A revolution in information technology   cloud computing.A revolution in information technology   cloud computing.
A revolution in information technology cloud computing.
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
Security & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networksSecurity & privacy issues of cloud & grid computing networks
Security & privacy issues of cloud & grid computing networks
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
 
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTSSECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Introduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptxIntroduction to Cloud Computing.pptx
Introduction to Cloud Computing.pptx
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

More from ijbuiiir1

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...ijbuiiir1
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Dataijbuiiir1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobileijbuiiir1
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...ijbuiiir1
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoisingijbuiiir1
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...ijbuiiir1
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...ijbuiiir1
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Modelijbuiiir1
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...ijbuiiir1
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networksijbuiiir1
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...ijbuiiir1
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Networkijbuiiir1
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...ijbuiiir1
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeijbuiiir1
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transformijbuiiir1
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERPijbuiiir1
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soaijbuiiir1
 

More from ijbuiiir1 (20)

Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
Partial Image Retrieval Systems in Luminance and Color Invariants : An Empiri...
 
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter DataApplying Clustering Techniques for Efficient Text Mining in Twitter Data
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Vehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in MobileVehicle to Vehicle Communication of Content Downloader in Mobile
Vehicle to Vehicle Communication of Content Downloader in Mobile
 
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
SPOC: A Secure and Private-pressuring Opportunity Computing Framework for Mob...
 
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image DenoisingA Survey on Implementation of Discrete Wavelet Transform for Image Denoising
A Survey on Implementation of Discrete Wavelet Transform for Image Denoising
 
A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...A Study on migrated Students and their Well - being using Amartya Sens Functi...
A Study on migrated Students and their Well - being using Amartya Sens Functi...
 
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
Methodologies on user Behavior Analysis and Future Request Prediction in Web ...
 
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...Innovative Analytic and Holistic Combined Face Recognition and Verification M...
Innovative Analytic and Holistic Combined Face Recognition and Verification M...
 
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM ModelEnhancing Effective Interoperability Between Mobile Apps Using LCIM Model
Enhancing Effective Interoperability Between Mobile Apps Using LCIM Model
 
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
Deployment of Intelligent Transport Systems Based on User Mobility to be Endo...
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...Indian Language Text Representation and Categorization Using Supervised Learn...
Indian Language Text Representation and Categorization Using Supervised Learn...
 
Highly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over NetworkHighly Secured Online Voting System (OVS) Over Network
Highly Secured Online Voting System (OVS) Over Network
 
Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...Software Developers Performance relationship with Cognitive Load Using Statis...
Software Developers Performance relationship with Cognitive Load Using Statis...
 
Wireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBeeWireless Health Monitoring System Using ZigBee
Wireless Health Monitoring System Using ZigBee
 
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet TransformImage Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
Image Compression Using Discrete Cosine Transform & Discrete Wavelet Transform
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Web Based Secure Soa
Web Based Secure SoaWeb Based Secure Soa
Web Based Secure Soa
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

Virtualized Web Desktop Towards Faster Cloud OS

  • 1. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 02 December 2012 Page No.25-27 ISSN: 2278-2389 25 Virtualized Web Desktop Towards A Faster Web Cloud Operating System Bittu Daimary,Mahesh Chettri,Amina Sultana MCA 6th semester, St. Anthony’s College,Shillong, Meghalaya Email:bittudaimary@gmail.com,mahesh.chetri@gmail.com,amina.sultana@hotmail.com Abstract- All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service. Keywords-cloud operating system; cloud computing I. INTRODUCTION An operating system (OS) is a software program that manages the hardware and software resources of a computer. The OS performs basic tasks, such as controlling and allocating memory, prioritizing the processing of instructions, controlling input and output devices, facilitating networking, and managing files [1]. The features of the operating systems are totally dependent on the type of software. Every operating system differs from each other in some features while there are some features which are common in all operating systems. Some of the features of the operating systems are listed below: [2]. Operating System Software and hardware management The operating system is the bridge between computer hardware and software and makes the communication between them possible. Also communication between different softwares in the computer is also taken care by operating system [2]. Constant API Application Program Interface (API) is a software that allows different applications that run on a computer to work on other computers also. But they should have same operating system. So it is very vital to have consistent API in the operating system [2]. Execution Of Programs Programs running in the computer are completely dependent on the operating system. But program execution is a difficult process. The multitasking and multithreading features of the operating system are dependent upon the type of program execution feature of OS [2]. Interruptions Interruption may happen at anytime while using the computers. The operating system allows and handles many numbers of interrupts. Whenever an interruption occurs, the operating system responds to it by saving and stopping the current execution and works on the new execution. This is the most hard-hitting process for the operating system [2]. Managing Memory The operating system provides the memory for the programs that are executed at any moment. So the operating system should have good memory allocation facility to execute the programs smoothly. The prioritization and allocation of memory to the applications running should be taken care by the operating systems [2]. Networking The operating system makes it possible for one computer to communicate with other computers in a network [2]. Security An operating system in the computer takes care of all security issues of computer and data in it. Login passwords, firewall settings, and every such aspect related to security depends on the ability of the operating system. Some of the computers in network may involve in file sharing, and other data sharing. Hence, it becomes vital to have powerful secured operating systems [2]. Cloud Computing Cloud computing is a term that describes the means of delivering any and all Information Technology – from computing power to computing infrastructure, applications, business processes and personal collaboration – to end users as a service wherever and whenever they need it [3].The cloud in cloud computing is the set of hardware, software, networks, storage, services, and interfaces that combine to deliver aspects of computing as a service. Shared resources, softwares and information are provided to computers and other devices on demand. It allows people to do things they want to do on a computer without the need for them to buy and build an IT infrastructure or to understand the underlying technology [3].The reason behind the adoption of cloud computing over other IT deployments is flexibility, scalability, rapid provisioning, reliability, stability and green solutions [3].There are different kinds of cloud deployment models which provide different kinds of services and are classified into four types:
  • 2. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 02 December 2012 Page No.25-27 ISSN: 2278-2389 26 Public Cloud In Public cloud the computing infrastructure is hosted by the cloud vendor at the vendor’s premises. The customer has no visibility and control over where the computing infrastructure is hosted. The computing infrastructure is shared between any organizations [4]. Private Cloud The computing infrastructure is dedicated to a particular organization and not shared with other organizations. Some experts consider that private clouds are not real examples of cloud computing. Private clouds are more expensive and more secure when compared to public clouds.Private clouds are of two types: On-premise private clouds and externally hosted private clouds. Externally hosted private clouds are also exclusively used by one organization, but are hosted by a third party specializing in cloud infrastructure. Externally hosted private clouds are cheaper than On-premise private clouds [4]. Hybrid Cloud Organizations may host critical applications on private clouds and applications with relatively less security concerns on the public cloud. The usage of both private and public clouds together is called hybrid cloud. A related term is Cloud Bursting. In Cloud bursting organization use their own computing infrastructure for normal usage, but access the cloud for high/peak load requirements. This ensures that a sudden increase in computing requirement is handled gracefully [4]. Community Cloud Community cloud involves sharing of computing infrastructure in between organizations of the same community. For example all Government organizations within the state of California may share computing infrastructure on the cloud to manage data related to citizens residing in California [4]. The different types of Cloud Services are: 1) Infrastructure As A Service(Iaas) The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls)[5]. 2) Platform As A Service(PaaS) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment [5]. 3)Software As A Service(SaaS) The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings [5]. Cloud Operating System Cloud Operating System is one of the interesting features of Cloud Computing. Cloud Operating System can be treated as Platform as a Service. Any operating system can be placed in cloud and it can be accessed from any local machine having the feel of running the Operating System locally. But in the current implementation of cloud Operating System, a mouse or keyboard event is sent by the client to the Operating System residing in the cloud. This OS performs operations on the events received and responds with a corresponding output to the client. If an event occurs requiring to change something on the screen (For e.g. creating a window), the OS residing in the cloud creates an image of the screen and sends it to the client as an output. If such an event occurs frequently, huge amount of images would be sent by the Cloud Operating System to the client; which proves to be not very efficient if the bandwidth of the internet is not high. II.THE PROPOSED SYSTEM To overcome the problem described above, a model called Virtualized Web Desktop is proposed. Below is the pictorial description of the proposed model: Basic architecture of Virtualized Web Desktop Interaction via Output Interrupt displayed Client Message Server Message CLIENT (Packet Message) --------------------------------------------------------------------------------------- SERVER Browser Web Client OS Web Request Handler Operating System Create Message Create Display Request Interceptor Trigger Event Web Window
  • 3. Integrated Intelligent Research (IIR) International Journal of Web Technology Volume: 01 Issue: 02 December 2012 Page No.25-27 ISSN: 2278-2389 27 Virtualized Web Desktop Virtualized Web Desktop is a modification of Cloud Operating System which can be placed in the cloud and can be accessed from any local machine using only a browser in a much faster way. The components which will be required for proper functioning of Virtualized Web Desktop are: Browser Browser acts as a platform for users to interact with the Operating System residing in the cloud. Web Client OS Web Client OS runs in the client side which can be purely written in Javascript. Web Client OS have two main functions: Create Message Create Message interprets the click or keypress event triggered by any application running in the browser. A packet message corresponding to this event is created and is then send to the server using http/https protocols. This packet message is a message carrier which is used to carry information between two ends. Packet Message carries two types of messages. They are: Client Message Client Message is used for sending event triggered information to the Server. Along with it, it holds other relative information about the event. Server Message: Server Message is basically a command and other corresponding data required to fulfill the requested event. This message is generated from the processing done in the server side Operating System. This message is then send to the client. Create Display The main functionality of Create Display is to receive a command and other relevant data from the server, perform operations based on the command specified and finally presenting the output requested for. For e.g. if it receives a command to create window, it creates window using HTML and performs the changes on the DOM structure as per required to display the window on the screen. Web Request Handler Web Request Handler runs in the server side. It is an application running on top of Operating System which is in the cloud.The functionality provided by Web Request Handler is: Request Interceptor: It intercepts the request send by the client (i.e. Client Message) and extracts the information about which application invoked the event, what is the type of event and other information related to it. Trigger Event: It triggers event in the Operating System residing in the Cloud for a particular application specified in Client Message. This OS residing in the cloud then handles the event and performs the required operation similar to what any normal Operating System intends to do. Web Window: It is the replacement of the GUI creation (like XWindow System) component present in the actual OS in the cloud. Web Window component uses the generalized set of commands and performs the necessary functioning corresponding to the commands invoked. This information is then passed on to the client via server message. Thus, the actual creation of the interface is done on the client side. (Web Client OS with the aid of Create Display. Unlike in the existing cloud OS where images are being passed every time.) III.CONCLUSION The idea presented here is the change in the protocol in which the communication between thin clients and servers takes place in a cloud OS. The proposed system uses protocols in the form of commands which helps thin clients in GUI creation. The use of commands makes the load lighter in the network thus providing faster servicing. On the part of the client it requires only a small processing for interpreting the command and providing the GUI interface. Thus, leading to a better performance in service. REFERENCES [1] OperatingSystem,http://gama.vtu.lt/biblioteka/Operating_systems/Operating _systems.pdf,2012 [2] Features of OS, http://computersecuritycrew.com/features_of_os.php, 2012 [3] Dr. Kumar Saurabh, “Cloud Computing-Insights into New-Era Infrastructure”, New Delhi, Wiley India Private Limited, 2011 [4] Cloud computing tutorail, http://thecloudtutorial.com, 2012 [5] NIST definition of cloud services, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, 2012 [6] Barrie Sosinky, “Cloud Computing Bible”, New Delhi, Wiley India Private Limited,2011