SlideShare a Scribd company logo
1 of 16
Improving Utilization of
Infrastructure Clouds
Abstract
 A key advantage of Infrastructure-as-a-Service (IaaS)
clouds is providing users on-demand access to
resources.
 To provide on-demand access, cloud providers must
either significantly overprovision their infrastructure
(and pay a high price for operating resources with
low utilization) or reject a large proportion of user
requests (in which case the access is no longer on-
demand).
 At the same time, not all users require truly on-
demand access to resources.
 Many applications and workflows are designed
for recoverable systems where interruptions in
service are expected.
 We propose a cloud infrastructure that combines
on-demand allocation of resources with
opportunistic provisioning of cycles from idle
cloud nodes to other processes.
Existing System
 Impossible to know whether the terms of the Service
Level Agreement (SLA) are being met without
monitoring and measuring the performance of the
service.
 Service Level Management is how that performance
information is gathered and handled.
 Measurements of the service are based on the
Service Level Objectives in the SLA.
 A cloud provider uses Service Level Management to
make decisions about its infrastructure.
Disadvantages
 Many applications and workflows are
designed for recoverable systems where
interruptions in service are expected.
 Impossible to know whether the terms of the
Service Level Agreement (SLA) are being met
without monitoring and measuring the
performance of the service.
Architecture
Problem Statement
 Infrastructure-as-a-Service (IaaS) cloud
computing has emerged as an attractive
alternative to the acquisition and management of
physical resources.
 The on demand provisioning it supports allows
users to elastically expand and contract the
resource base available to them based on an
immediate need – a pattern that enables a quick
turnaround time when dealing with emergencies,
working towards deadlines, or growing an
institutional resource base.
Proposed System
 We demonstrate that a shared infrastructure
between IaaS cloud providers and an HTC job
management system can be highly beneficial
to both the IaaS cloud provider and HTC users
by increasing the utilization of the cloud
infrastructure (thereby decreasing the overall
cost) and contributing cycles that would
otherwise be idle to processing HTC jobs.
Modules
1. Ondemand User
2. Opportunistic User
3. Fraud Detection Service
4. Automation and Management service
Ondemand User
 On-demand, non-preemptible and flexible
leases give a user access to a resource within
interactive time of making the request and
make the resource available for an agreed-
upon period of time. The user can deploy any
VM compatible with the system.
Opportunistic User
 Opportunistic, preemptible and pre-set leases
give a user access to a resource at an
indeterminate time and make the resource
available to the user for an indeterminate
amount of time. Further, this resource is pre-
defined for the user by the cloud
administrator, i.e. the user cannot provide his
or her own VM.
Fraud Detection Service
 Our goal is to detect when the distributor’s
sensitive data has been leaked by agents, and
if possible to identify the agent that leaked
the data. Perturbation is a very useful
technique where the data is modified and
made “less sensitive” before being handed to
agents. we develop unobtrusive techniques
for detecting leakage of a set of objects or
records.
Automation and Management service
 This system typically enables the top level
management to keep track of the status of the
projects under their control.
H/W System Configuration
 Processor - Pentium –III
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
S/W System Configuration
• Operating System - Windows95/98/2000/XP
• Front End - HTML, Java, JSP
• Database - MsAccess
• Database Connectivity- JDBC.
Improving Infrastructure Cloud Utilization and HTC Job Processing

More Related Content

What's hot

Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management MechanismsSouparnika Patil
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...SaikiranReddy Sama
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles Nilay Shrivastava
 
Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)Ankit Gupta
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESTushar Dhoot
 
How to choose the right Database technology for your business?
How to choose the right Database technology for your business?How to choose the right Database technology for your business?
How to choose the right Database technology for your business?Ashnikbiz
 
tcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computingtcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud ComputingMarketingArrowECS_CZ
 
Cloud computing-intro
Cloud computing-introCloud computing-intro
Cloud computing-introschahzada
 
Emergence of cloud computing and internet of things an overview
Emergence of cloud computing and internet of things   an overviewEmergence of cloud computing and internet of things   an overview
Emergence of cloud computing and internet of things an overviewSelvaraj Kesavan
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
Performance issues in Cloud Computing
Performance issues in Cloud ComputingPerformance issues in Cloud Computing
Performance issues in Cloud ComputingKrishna Mohan Mishra
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1Sandip Kadam
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesIEEEFINALYEARPROJECTS
 

What's hot (20)

Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Management Mechanisms
Cloud Management MechanismsCloud Management Mechanisms
Cloud Management Mechanisms
 
Virtualization - cloud computing
Virtualization - cloud computingVirtualization - cloud computing
Virtualization - cloud computing
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
 
Consumer side
Consumer sideConsumer side
Consumer side
 
Cloud Application architecture styles
Cloud Application architecture styles Cloud Application architecture styles
Cloud Application architecture styles
 
Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)Mod05lec25(resource mgmt ii)
Mod05lec25(resource mgmt ii)
 
CLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTESCLOUD COMPUTING UNIT-5 NOTES
CLOUD COMPUTING UNIT-5 NOTES
 
How to choose the right Database technology for your business?
How to choose the right Database technology for your business?How to choose the right Database technology for your business?
How to choose the right Database technology for your business?
 
Cloud Computing - Introduction
Cloud Computing - IntroductionCloud Computing - Introduction
Cloud Computing - Introduction
 
tcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computingtcp cloud - Advanced Cloud Computing
tcp cloud - Advanced Cloud Computing
 
Fundamental Cloud Architectures
Fundamental Cloud ArchitecturesFundamental Cloud Architectures
Fundamental Cloud Architectures
 
Cloud computing-intro
Cloud computing-introCloud computing-intro
Cloud computing-intro
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Emergence of cloud computing and internet of things an overview
Emergence of cloud computing and internet of things   an overviewEmergence of cloud computing and internet of things   an overview
Emergence of cloud computing and internet of things an overview
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Performance issues in Cloud Computing
Performance issues in Cloud ComputingPerformance issues in Cloud Computing
Performance issues in Cloud Computing
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 

Similar to Improving Infrastructure Cloud Utilization and HTC Job Processing

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Journals
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxSURBHI SAROHA
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdfnipun014p
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management AngelineR
 
IaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudIaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudijsrd.com
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...IJECEIAES
 

Similar to Improving Infrastructure Cloud Utilization and HTC Job Processing (20)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
A survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environmentA survey on various resource allocation policies in cloud computing environment
A survey on various resource allocation policies in cloud computing environment
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
E42053035
E42053035E42053035
E42053035
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
Cloud computing charecteristics and types   altanai bisht , 2nd year,  part iiiCloud computing charecteristics and types   altanai bisht , 2nd year,  part iii
Cloud computing charecteristics and types altanai bisht , 2nd year, part iii
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Introducing cloud computing
Introducing cloud computingIntroducing cloud computing
Introducing cloud computing
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
3.IaabbhjbjbhjbbjbbjbhjhhbbjbhbjhbbjS.pdf
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
IaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloudIaaS Resource Usage Monitoring In cloud
IaaS Resource Usage Monitoring In cloud
 
B03410609
B03410609B03410609
B03410609
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 

More from Raga Deepthi

More from Raga Deepthi (11)

Group Discussions
Group DiscussionsGroup Discussions
Group Discussions
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Image Processing
Image ProcessingImage Processing
Image Processing
 
Image processing
Image processingImage processing
Image processing
 
blue eye technology
blue eye technologyblue eye technology
blue eye technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Humanoid robot
Humanoid robotHumanoid robot
Humanoid robot
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
Artifial intelligence
Artifial intelligenceArtifial intelligence
Artifial intelligence
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Improving Infrastructure Cloud Utilization and HTC Job Processing

  • 2. Abstract  A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources.  To provide on-demand access, cloud providers must either significantly overprovision their infrastructure (and pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on- demand).
  • 3.  At the same time, not all users require truly on- demand access to resources.  Many applications and workflows are designed for recoverable systems where interruptions in service are expected.  We propose a cloud infrastructure that combines on-demand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes.
  • 4. Existing System  Impossible to know whether the terms of the Service Level Agreement (SLA) are being met without monitoring and measuring the performance of the service.  Service Level Management is how that performance information is gathered and handled.  Measurements of the service are based on the Service Level Objectives in the SLA.  A cloud provider uses Service Level Management to make decisions about its infrastructure.
  • 5. Disadvantages  Many applications and workflows are designed for recoverable systems where interruptions in service are expected.  Impossible to know whether the terms of the Service Level Agreement (SLA) are being met without monitoring and measuring the performance of the service.
  • 7. Problem Statement  Infrastructure-as-a-Service (IaaS) cloud computing has emerged as an attractive alternative to the acquisition and management of physical resources.  The on demand provisioning it supports allows users to elastically expand and contract the resource base available to them based on an immediate need – a pattern that enables a quick turnaround time when dealing with emergencies, working towards deadlines, or growing an institutional resource base.
  • 8. Proposed System  We demonstrate that a shared infrastructure between IaaS cloud providers and an HTC job management system can be highly beneficial to both the IaaS cloud provider and HTC users by increasing the utilization of the cloud infrastructure (thereby decreasing the overall cost) and contributing cycles that would otherwise be idle to processing HTC jobs.
  • 9. Modules 1. Ondemand User 2. Opportunistic User 3. Fraud Detection Service 4. Automation and Management service
  • 10. Ondemand User  On-demand, non-preemptible and flexible leases give a user access to a resource within interactive time of making the request and make the resource available for an agreed- upon period of time. The user can deploy any VM compatible with the system.
  • 11. Opportunistic User  Opportunistic, preemptible and pre-set leases give a user access to a resource at an indeterminate time and make the resource available to the user for an indeterminate amount of time. Further, this resource is pre- defined for the user by the cloud administrator, i.e. the user cannot provide his or her own VM.
  • 12. Fraud Detection Service  Our goal is to detect when the distributor’s sensitive data has been leaked by agents, and if possible to identify the agent that leaked the data. Perturbation is a very useful technique where the data is modified and made “less sensitive” before being handed to agents. we develop unobtrusive techniques for detecting leakage of a set of objects or records.
  • 13. Automation and Management service  This system typically enables the top level management to keep track of the status of the projects under their control.
  • 14. H/W System Configuration  Processor - Pentium –III  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB
  • 15. S/W System Configuration • Operating System - Windows95/98/2000/XP • Front End - HTML, Java, JSP • Database - MsAccess • Database Connectivity- JDBC.