SlideShare a Scribd company logo
ISSN: 2278 – 1323
                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                            Volume 1, Issue 4, June 2012



      Virtualizing the Private Cloud for Maximum
                  Resource Utilization
                                          C.Shreeharsha, Prof.ManasiKulkarni
                                   Computer Engineering Department, VJTI , Matunga, Mumbai, India,
                                                   E-mail:harshagzb89@gmail.com.



                                                                    and mobile apps, while the business software and data
Abstract –Cloud computing ,now- a- days is a trend in the IT
industry.We normally deploy cloud based infrastructure,             are stored on servers at a remote location. In some
applications on Bare-metal hardware. But still the resource         cases, legacy applications (line of business
utilization is not at its maximum .There is still some amount of    applications that until now have been prevalent in thin
room for addition of more applications, etc..to utilize resources   client Windows computing) are delivered via a screen-
to their max. Now, since cloud is already virtualized, we further   sharing technology, while the computing resources are
virtualize the cloud using Virtualization Software.The resources    consolidated at a remote data center location. At the
may be CPU,Memory,etc..Virtualization of cloud enables us to        foundation of cloud computing is the broader concept
run multiple clouds on a single physical machine. That makes        of     infrastructure    convergence    (or Converged
resource utilization, the maximum. This paper shows how to use
                                                                    Infrastructure) and shared services. This type of data
the resources optimally by deploying multiple clouds on a single
physical machine.
                                                                    center environment allows enterprises to get their
                                                                    applications up and running faster, with easier
                                                                    manageability and less maintenance, and enables IT to
 Кеу words –Cloud Computing,Virtualization,Resources.               more rapidly adjust IT resources (such as servers,
                                                                    storage, and networking) to meet fluctuating and
                                                                    unpredictable business demand.
 I. Introduction                                                    Most cloud computing infrastructures consist of
During the last ten years, mobile handheld devices have             services delivered through shared data-centers and
become a part of our everyday lives. Cloud Computing is             appearing as a single point of access for consumers'
easily defined as “Anything that is provided as a                   computing needs. Commercial offerings may be
Service”.Cloud computing is the delivery of computing               required to meet service-level agreements (SLAs), but
resources as a service rather than a product, whereby shared        specific terms are less often negotiated by smaller
resources, software, and information are provided to                companies.The tremendous impact of cloud
computers and other devices as a utility (like the electricity      computing on business has prompted the federal
grid) over a network (typically the Internet).Cloud computing       United States government to look to the cloud as a
is a marketing term for technologies that provide                   means to reorganize their IT infrastructure and
computation, software, data access, and storage services that       decrease their spending budgets. With the advent of
do not require end-user knowledge of the physical location          the top government official mandating cloud adoption,
and configuration of the system that delivers the services. A       many agencies already have at least one or more cloud
parallel to this concept can be drawn with the electricity grid,    systems online.
wherein end-users consume power without needing to
understand the component devices or infrastructure required
to provide the service. Or similar comparisons can also be            II. Cloud Computing
done with the bus service we use. We don’t have to buy the
bus for our purpose of travelling we just have to pay for the       Cloud computing is the delivery of computing as
service we use. Cloud computing describes a new                     a service rather than a product, whereby shared
supplement, consumption, and delivery model for IT services         resources, software, and information are provided to
based on Internet protocols, and it typically involves              computers and other devices as a utility (like
provisioning of scalable and often virtualized resources. It is     the electricity   grid)    over    a network (typically
a byproduct and consequence of the ease-of-access to remote
                                                                    the Internet). Cloud computing entrusts, typically
computing sites provided by the Internet.This may take the
                                                                    centralized, services with your data, software, and
form of web-based tools or applications that users can access
                                                                    computation on a published application programming
and use through a web browser as if the programs were
installed locally on their own computers.                           interface (API) over a network. It has a lot of overlap
                                                                    with the software as a service (SaaS).End users access
Cloud computing providers deliver applications via the              cloud based applications through a web browser or a
internet, which are accessed from web browsers and desktop


                                                                                                                              484
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                International Journal of Advanced Research in Computer Engineering & Technology
                                                                                    Volume 1, Issue 4, June 2012

light weight desktop or mobile app                 while the       stack typically     including     operating   system,
business software and data are stored on servers at a remote       programming language execution environment,
location. Cloud application providers strive to give the same      database, and web server. Application developers can
or better service and performance than if the software             develop and run their software solutions on a cloud
programs were installed locally on end-user computers.             platform without the cost and complexity of buying
                                                                   and managing the underlying hardware and software
                                                                   layers. With some PaaS offers, the underlying
  Cloud Service Models - Cloud computing providers offer           compute and storage resources scale automatically to
their    services    according    to    three    fundamental       match application demand such that the cloud user
models: Infrastructure as a service (IaaS), platform as a          does not have to allocate resources manually.
service PaaS), and software as a service (SaaS) where IaaS is
the most basic and each higher model abstracts from the
details of the lower models.
                                                                   III. Virtualization of Cloud

a) Iaas (Infrastructure as a Service)- In this most basic             We use VMware Technologies to deploy the
cloud service model, cloud providers offer computers – as          cloud.Now ,VMware Workstation is used to deploy a
physical or more often as virtual machines –, raw (block)          private cloud using Ubuntu cloud. When we launch
storage, firewalls, load balancer, and networks. IaaS              instances from the this cloud,we see that CPU usage is
providers supply these resources on demand from their large        still 3-4% which is a very less.The CPU usage must
pools installed in data centers. Local area networks including     hover around 70-80% for maximum utilization.The
IP addresses are part of the offer. For the wide area              memory usage is also nearing 50%,which should be
connectivity, the Internet can be used or - in carrier clouds -    100% for max.So we see that we can actually run
dedicated virtual private network can be configured.               multiple clouds on a same physical machine to
                                                                   increase resource utilization.
To deploy their applications, cloud users then install                This can also be called as a “cloud within a cloud”
operating system images on the machines as well as their           as we are virtualizing the virtualized resources.Inside
application software. In this model, it is the cloud user who is   the “cloud within the cloud” there are a great number
responsible for patching and maintaining the operating             of pieces of infrastructure working together. There are
systems and application software. Cloud providers typically        core networking components i.e. routers, switches,
bill IaaS services on a utility computing basis, that is, cost     DNS ,DHCP. Connectivity is not possible if these are
will reflect the amount of resources allocated and consumed.       not present.Moving up the stack we find load
In our Cloud based query solver system the service provided        balancing and application delivery infrastructure; the
to the students is the Iaas and Saas. It provides computer as      core application networking components that enable
virtual machines to the students and the software given as the     the dynamism promised by virtualized environments
service is the Query solver interface with the help of which       to be achieved. Without a layer of infrastructure
the students can ask their queries to their respective Prof.       bridging the gap between the network and the
                                                                   applications, virtualized or not, it is difficult to
b)Saas (Software as a Service) - In this model, cloud              achieve the kind of elasticity and dynamism necessary
providers install and operate application software in the cloud    for the cloud to “just work” for end users.
and cloud users access the software from cloud clients. The           It is the application networking layer that is
cloud users do not manage the cloud infrastructure and             responsible for ensuring availability, proper routing of
platform on which the application is running. This eliminates      requests, and applying application level policies such
the need to install and run the application on the cloud user's    as security andacceleration. This layer must be
own computers simplifying maintenance and support. What            dynamic, because the actual virtualized layers of web
makes a cloud application different from other applications is     and application servers are themselves dynamic.
its elasticity. This can be achieved by cloning tasks onto         Application instances may move from IP to IP across
multiple virtual machines at run-time to meet the changing         hours or days, and it is necessary for the application
work demand. Load balancers distribute the work over the set       networking layer to be able to adapt to that change
of virtual machines. This process is transparent to the cloud      without requiring manual intervention in the form of
user who sees only a single access point. To accommodate a         configuration modification.
large number of cloud users, cloud applications can                   Storage virtualization, too, resides in this layer of
be multitenant, that is, any machine serves more than one          the infrastructure. Storage virtualization provides
cloud user organization. It is common to refer to special types    enables a dynamic infrastructure by presenting a
of cloud based application software with a similar naming          unified view of storage to the applications and internal
convention: desktop as a service, business process as a            infrastructure, ensuring that the application need not
service, Test Environment as a Service, communication as a         be modified in order to access file-based resources.
service.                                                           Storage virtualization can further be the means
                                                                   through which cloud control mechanisms manage the
c) Paas ( Platform as a Service) - In the PaaS model, cloud        myriad virtual images required to support a cloud
providers deliver a computing platform and/or solution             computing infrastructure.




                                                                                                                       485
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                International Journal of Advanced Research in Computer Engineering & Technology
                                                                                    Volume 1, Issue 4, June 2012

   The role of the application networking layer is to mediate,
or broker, between clients and the actual applications to
ensure a seamless access experience regardless of where the
actual application instance might be running at any given
time. It is the application networking layer that
provides network and server virtualization such that the
actual implementation of the cloud is hidden from external
constituents. Much like storage virtualization, application
networking layers present a “virtual” view of the applications
and resources requiring external access.This is why
dynamism is such an integral component of a cloud
computing infrastructure: the application networking layer           Fig.2:Private Cloud 2 running
must, necessarily, keep tabs on application instances and be
able to associate them with the appropriate “virtual”
application it presents to external users. Classic load
                                                                     We are running multiple clouds on the same
balancing solutions are incapable of such dynamic, near real-
                                                                   physical machine. At present only Infrastructure is
time reconfiguration and discovery and almost always require
                                                                   being provided as a service. This shows that we can
manual intervention.
   Dynamic application networking infrastructure is not only       consolidate resources much more instead of using
capable but excels at this type of autonomous function,            bare-metal hardware. This bare-metal hardware can be
integrating with the systems necessary to enable awareness of      used where there is a very huge demand viz. public
changes within the application infrastructure and act upon         clouds.For private clouds,there is no requirement of
them.                                                              bare-metal hardware.
   The “cloud within the cloud” need only be visible to
implementers; but as we move forward and more
organizations attempt to act on a localized cloud computing                      V - Implemented Work
strategy it becomes necessary to peer inside the cloud and
understand how the disparate pieces of technology combine.
This visibility is a requirement if organizations are to achieve     1) Installed VMware workstation on the machine
the goals desired through the implementation of a cloud                 running windows.
computing-based architecture: efficiency and scalability
                                                                     2) Installed Ubuntu Cloud (OpenStack) on two of
                                                                        the virtual machines with 5.5GB of RAM and
                                                                        two processors each.
IV – Proposed Work
                                                                     3) Deployed Ubuntu server(precise) on both of
We propose a multi-cloud model on a single physical                     the clouds.
Machine using Virtualization Software. This model will help
utilize resources more efficiently.                                  4) Launched instances in both the clouds
The screenshots of the same are as follows:-
                                                                     5) Connected to both the instances smoothly with
1)                                                                      windows running in background as the host OS.


                                                                      A. Screen Shorts of the implemented work


                                                                      Part I – Instances generated in ubuntu cloud




                Fig. 1:Private Cloud 1 running

     2)




                                                                                                                     486
                                            All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                       Volume 1, Issue 4, June 2012

     1)




                                                                  Fig. 5: Connecting to instance 172.20.1.2
                                                                  5)
     Fig. 3: No of instances created


2)




                                                                  Fig. 6:Connectecd to two instances on the same
                                                                  private cloud


     Fig.3:Connecting to an instance of IP 172.20.1.4

     3)                                                                            VI. CONCLUSION
                                                                  It is seen that there are many private clouds running
                                                                  on bare-metal hardware and still there is less resource
                                                                  utilization. So it is better to run multiple clouds on a
                                                                  single physical machine. This enables us to
                                                                  consolidate resources to a much more extent.This
                                                                  proposal is suitable for private clouds as there are less
                                                                  users compared to public clouds.




     Fig 4:Generated 2nd instance 172.20.1.2 in parallel                               VII. REFERENCES

                                                                       . 1.Daniel Nurmi, Rich Wolski, Sunil Soman and
                                                                  LamiaYouseff .Department of Computer Science
4)                                                                University of California.“The        Eucalyptus Open
                                                                  Source Cloud Computing System”, IEEE Computer
                                                                  Society.




                                                                                                                       487
                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                International Journal of Advanced Research in Computer Engineering & Technology
                                                                                    Volume 1, Issue 4, June 2012



  2. 2. K. Adams and O. Agesen. Acomparison of software
and    hardware    techniques   for   x86    virtualization.   In
ASPLOSXII:        Proceedings   of    the   12th   international                  C.Shreeharsha,M.Tech(NIMS),VJTI
conference on Architectural support for programming                 ,Matunga,Mumbai.Currently doing project work in
languages and operating systems, pages 2–13, NewYork, NY,           Cloud computing domain and want to pursue this in
USA, 2006. ACM.                                                     the future.


  3. D. GreschlerandT.Mangan. Networking lessons in
delivering   ’software as a service’: part ii. Int.J. Netw.
Manag12(6):339–345, 2002.


  4. P. Laplante, J. Zhang, and J. Voas. “What’s in a name?”
distinguishing between saas and soa. IT Professional,
10(3):46–50, May-June 2008.


  5. P. Barham,B.Dragovic,K. Fraser,S.Hand,T. Harris,
A.Ho,R. Neugebauer,I. Pratt,andA.Warfield. Xen and the art
of virtualization. In SOSP ’03: Proceedingsof the
nineteenthACM symposium on Operating
  systems principles, pages 164–177, New York, NY, USA,
2003.ACM.

  6. R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented
cloud computing: Vision, hype, and reality for delivering it
services as computing utilities. In
  Proceedings of the 10th IEEE International Conference on
HighPerformance Computing and Communications (HPCC-
08, IEEE CS Press, Los Alamitos, CA, USA) 2008.

  7. LamiaYouseff ,University of California, Santa Barbara
Santa Barbara, CA 93106 lyouseff@cs.ucsb.edu “Toward a
Unified Ontology of Cloud Computing”

  8.Peng Li, Lee W. Toderick ,Department of Technology
Systems, East Carolina University.”Cloud in Cloud –
Approaches and Implementations”




  9. Amazon simple storage service api (2006-03-01) –
http://docs.amazonwebservices.com/          AmazonS3/2006-03-
01/.
  10.OpenStack Administration Guide -www.openstack.org


  10.. VMware home page – http://www.vmware.com




                                                                                                                    488
                                             All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
Sandhya Rathi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Jawhar Ali
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
iosrjce
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cloud computing
Cloud computingCloud computing
Cloud computing
ABDALLA SAID
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
Alexander Decker
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
IJERA Editor
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
Faimin Khan
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
IJSRED
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant guptaPrashant Gupta
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
Govt. P.G. College Dharamshala
 

What's hot (18)

Group seminar report on cloud computing
Group seminar report on cloud computingGroup seminar report on cloud computing
Group seminar report on cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cyber forensics in cloud computing
Cyber forensics in cloud computingCyber forensics in cloud computing
Cyber forensics in cloud computing
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
IJSRED-V1I1P1
IJSRED-V1I1P1IJSRED-V1I1P1
IJSRED-V1I1P1
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Report on cloud computing by prashant gupta
Report on cloud computing by prashant guptaReport on cloud computing by prashant gupta
Report on cloud computing by prashant gupta
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
 
121 124
121 124121 124
121 124
 

Viewers also liked

Weekend conference organization - brief example
Weekend conference organization - brief exampleWeekend conference organization - brief example
Weekend conference organization - brief example
Sergio Stanga Romero
 
Cultivation envite
Cultivation enviteCultivation envite
Cultivation envitecbasinais
 
Nets 1
Nets 1Nets 1
Nets 1
Amychamp
 
Paris la nuit
Paris la nuitParis la nuit
Paris la nuitgloria
 
The Benefits Of Thermography Kiosk
The Benefits Of Thermography KioskThe Benefits Of Thermography Kiosk
The Benefits Of Thermography Kiosk
SalemORHomeInspector
 
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotospamimargon
 
Guia. Primer Formato, TamañO
Guia. Primer Formato, TamañOGuia. Primer Formato, TamañO
Guia. Primer Formato, TamañOguest97aa6b6
 
Collecting Knowledge
Collecting KnowledgeCollecting Knowledge
Collecting Knowledge
Nancy Stuewe
 
Using Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy EfficiencyUsing Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy EfficiencyCliff Majersik
 
first conditional
first conditionalfirst conditional
first conditional
Anna Tombas
 
Administrador De Empresas
Administrador De EmpresasAdministrador De Empresas
Administrador De Empresas
guest8d27ec
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
 
Presentazione
PresentazionePresentazione
Presentazioneiago3
 
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Editor IJARCET
 
profesiones cinematográficas
profesiones cinematográficasprofesiones cinematográficas
profesiones cinematográficas
evapayasa
 

Viewers also liked (20)

Weekend conference organization - brief example
Weekend conference organization - brief exampleWeekend conference organization - brief example
Weekend conference organization - brief example
 
Les Pasen
Les PasenLes Pasen
Les Pasen
 
Cultivation envite
Cultivation enviteCultivation envite
Cultivation envite
 
Nets 1
Nets 1Nets 1
Nets 1
 
Paris la nuit
Paris la nuitParis la nuit
Paris la nuit
 
The Benefits Of Thermography Kiosk
The Benefits Of Thermography KioskThe Benefits Of Thermography Kiosk
The Benefits Of Thermography Kiosk
 
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
2. En Busca De Nuestra Salud Y Nuestra Seguridad. Fotos
 
Guia. Primer Formato, TamañO
Guia. Primer Formato, TamañOGuia. Primer Formato, TamañO
Guia. Primer Formato, TamañO
 
Collecting Knowledge
Collecting KnowledgeCollecting Knowledge
Collecting Knowledge
 
Using Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy EfficiencyUsing Benchmarking to Catalyze Greater Energy Efficiency
Using Benchmarking to Catalyze Greater Energy Efficiency
 
first conditional
first conditionalfirst conditional
first conditional
 
Agenda
AgendaAgenda
Agenda
 
Administrador De Empresas
Administrador De EmpresasAdministrador De Empresas
Administrador De Empresas
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Presentazione
PresentazionePresentazione
Presentazione
 
donald
donalddonald
donald
 
Learner Profile
Learner ProfileLearner Profile
Learner Profile
 
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340
 
Kurume_1
Kurume_1Kurume_1
Kurume_1
 
profesiones cinematográficas
profesiones cinematográficasprofesiones cinematográficas
profesiones cinematográficas
 

Similar to 484 488

G017324043
G017324043G017324043
G017324043
IOSR Journals
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
Chetan Sontakke
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
IAEME Publication
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Sandeep Singh
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Manpreet Kaur
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
Sagar Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Vijay Kumar
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
Mehul Patel
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
SiddhantPandey67
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud computing
Cloud computingCloud computing
Cloud computingsandita12
 

Similar to 484 488 (20)

119 125
119 125119 125
119 125
 
G017324043
G017324043G017324043
G017324043
 
11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
P18 2 8-5
P18 2 8-5P18 2 8-5
P18 2 8-5
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
CLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCINGCLOUD COMPUTING AND LOAD BALANCING
CLOUD COMPUTING AND LOAD BALANCING
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing 1
Cloud computing 1Cloud computing 1
Cloud computing 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
51 59
51 5951 59
51 59
 
51 59
51 5951 59
51 59
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

484 488

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Virtualizing the Private Cloud for Maximum Resource Utilization C.Shreeharsha, Prof.ManasiKulkarni Computer Engineering Department, VJTI , Matunga, Mumbai, India, E-mail:harshagzb89@gmail.com. and mobile apps, while the business software and data Abstract –Cloud computing ,now- a- days is a trend in the IT industry.We normally deploy cloud based infrastructure, are stored on servers at a remote location. In some applications on Bare-metal hardware. But still the resource cases, legacy applications (line of business utilization is not at its maximum .There is still some amount of applications that until now have been prevalent in thin room for addition of more applications, etc..to utilize resources client Windows computing) are delivered via a screen- to their max. Now, since cloud is already virtualized, we further sharing technology, while the computing resources are virtualize the cloud using Virtualization Software.The resources consolidated at a remote data center location. At the may be CPU,Memory,etc..Virtualization of cloud enables us to foundation of cloud computing is the broader concept run multiple clouds on a single physical machine. That makes of infrastructure convergence (or Converged resource utilization, the maximum. This paper shows how to use Infrastructure) and shared services. This type of data the resources optimally by deploying multiple clouds on a single physical machine. center environment allows enterprises to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to Кеу words –Cloud Computing,Virtualization,Resources. more rapidly adjust IT resources (such as servers, storage, and networking) to meet fluctuating and unpredictable business demand. I. Introduction Most cloud computing infrastructures consist of During the last ten years, mobile handheld devices have services delivered through shared data-centers and become a part of our everyday lives. Cloud Computing is appearing as a single point of access for consumers' easily defined as “Anything that is provided as a computing needs. Commercial offerings may be Service”.Cloud computing is the delivery of computing required to meet service-level agreements (SLAs), but resources as a service rather than a product, whereby shared specific terms are less often negotiated by smaller resources, software, and information are provided to companies.The tremendous impact of cloud computers and other devices as a utility (like the electricity computing on business has prompted the federal grid) over a network (typically the Internet).Cloud computing United States government to look to the cloud as a is a marketing term for technologies that provide means to reorganize their IT infrastructure and computation, software, data access, and storage services that decrease their spending budgets. With the advent of do not require end-user knowledge of the physical location the top government official mandating cloud adoption, and configuration of the system that delivers the services. A many agencies already have at least one or more cloud parallel to this concept can be drawn with the electricity grid, systems online. wherein end-users consume power without needing to understand the component devices or infrastructure required to provide the service. Or similar comparisons can also be II. Cloud Computing done with the bus service we use. We don’t have to buy the bus for our purpose of travelling we just have to pay for the Cloud computing is the delivery of computing as service we use. Cloud computing describes a new a service rather than a product, whereby shared supplement, consumption, and delivery model for IT services resources, software, and information are provided to based on Internet protocols, and it typically involves computers and other devices as a utility (like provisioning of scalable and often virtualized resources. It is the electricity grid) over a network (typically a byproduct and consequence of the ease-of-access to remote the Internet). Cloud computing entrusts, typically computing sites provided by the Internet.This may take the centralized, services with your data, software, and form of web-based tools or applications that users can access computation on a published application programming and use through a web browser as if the programs were installed locally on their own computers. interface (API) over a network. It has a lot of overlap with the software as a service (SaaS).End users access Cloud computing providers deliver applications via the cloud based applications through a web browser or a internet, which are accessed from web browsers and desktop 484 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 light weight desktop or mobile app while the stack typically including operating system, business software and data are stored on servers at a remote programming language execution environment, location. Cloud application providers strive to give the same database, and web server. Application developers can or better service and performance than if the software develop and run their software solutions on a cloud programs were installed locally on end-user computers. platform without the cost and complexity of buying and managing the underlying hardware and software layers. With some PaaS offers, the underlying Cloud Service Models - Cloud computing providers offer compute and storage resources scale automatically to their services according to three fundamental match application demand such that the cloud user models: Infrastructure as a service (IaaS), platform as a does not have to allocate resources manually. service PaaS), and software as a service (SaaS) where IaaS is the most basic and each higher model abstracts from the details of the lower models. III. Virtualization of Cloud a) Iaas (Infrastructure as a Service)- In this most basic We use VMware Technologies to deploy the cloud service model, cloud providers offer computers – as cloud.Now ,VMware Workstation is used to deploy a physical or more often as virtual machines –, raw (block) private cloud using Ubuntu cloud. When we launch storage, firewalls, load balancer, and networks. IaaS instances from the this cloud,we see that CPU usage is providers supply these resources on demand from their large still 3-4% which is a very less.The CPU usage must pools installed in data centers. Local area networks including hover around 70-80% for maximum utilization.The IP addresses are part of the offer. For the wide area memory usage is also nearing 50%,which should be connectivity, the Internet can be used or - in carrier clouds - 100% for max.So we see that we can actually run dedicated virtual private network can be configured. multiple clouds on a same physical machine to increase resource utilization. To deploy their applications, cloud users then install This can also be called as a “cloud within a cloud” operating system images on the machines as well as their as we are virtualizing the virtualized resources.Inside application software. In this model, it is the cloud user who is the “cloud within the cloud” there are a great number responsible for patching and maintaining the operating of pieces of infrastructure working together. There are systems and application software. Cloud providers typically core networking components i.e. routers, switches, bill IaaS services on a utility computing basis, that is, cost DNS ,DHCP. Connectivity is not possible if these are will reflect the amount of resources allocated and consumed. not present.Moving up the stack we find load In our Cloud based query solver system the service provided balancing and application delivery infrastructure; the to the students is the Iaas and Saas. It provides computer as core application networking components that enable virtual machines to the students and the software given as the the dynamism promised by virtualized environments service is the Query solver interface with the help of which to be achieved. Without a layer of infrastructure the students can ask their queries to their respective Prof. bridging the gap between the network and the applications, virtualized or not, it is difficult to b)Saas (Software as a Service) - In this model, cloud achieve the kind of elasticity and dynamism necessary providers install and operate application software in the cloud for the cloud to “just work” for end users. and cloud users access the software from cloud clients. The It is the application networking layer that is cloud users do not manage the cloud infrastructure and responsible for ensuring availability, proper routing of platform on which the application is running. This eliminates requests, and applying application level policies such the need to install and run the application on the cloud user's as security andacceleration. This layer must be own computers simplifying maintenance and support. What dynamic, because the actual virtualized layers of web makes a cloud application different from other applications is and application servers are themselves dynamic. its elasticity. This can be achieved by cloning tasks onto Application instances may move from IP to IP across multiple virtual machines at run-time to meet the changing hours or days, and it is necessary for the application work demand. Load balancers distribute the work over the set networking layer to be able to adapt to that change of virtual machines. This process is transparent to the cloud without requiring manual intervention in the form of user who sees only a single access point. To accommodate a configuration modification. large number of cloud users, cloud applications can Storage virtualization, too, resides in this layer of be multitenant, that is, any machine serves more than one the infrastructure. Storage virtualization provides cloud user organization. It is common to refer to special types enables a dynamic infrastructure by presenting a of cloud based application software with a similar naming unified view of storage to the applications and internal convention: desktop as a service, business process as a infrastructure, ensuring that the application need not service, Test Environment as a Service, communication as a be modified in order to access file-based resources. service. Storage virtualization can further be the means through which cloud control mechanisms manage the c) Paas ( Platform as a Service) - In the PaaS model, cloud myriad virtual images required to support a cloud providers deliver a computing platform and/or solution computing infrastructure. 485 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The role of the application networking layer is to mediate, or broker, between clients and the actual applications to ensure a seamless access experience regardless of where the actual application instance might be running at any given time. It is the application networking layer that provides network and server virtualization such that the actual implementation of the cloud is hidden from external constituents. Much like storage virtualization, application networking layers present a “virtual” view of the applications and resources requiring external access.This is why dynamism is such an integral component of a cloud computing infrastructure: the application networking layer Fig.2:Private Cloud 2 running must, necessarily, keep tabs on application instances and be able to associate them with the appropriate “virtual” application it presents to external users. Classic load We are running multiple clouds on the same balancing solutions are incapable of such dynamic, near real- physical machine. At present only Infrastructure is time reconfiguration and discovery and almost always require being provided as a service. This shows that we can manual intervention. Dynamic application networking infrastructure is not only consolidate resources much more instead of using capable but excels at this type of autonomous function, bare-metal hardware. This bare-metal hardware can be integrating with the systems necessary to enable awareness of used where there is a very huge demand viz. public changes within the application infrastructure and act upon clouds.For private clouds,there is no requirement of them. bare-metal hardware. The “cloud within the cloud” need only be visible to implementers; but as we move forward and more organizations attempt to act on a localized cloud computing V - Implemented Work strategy it becomes necessary to peer inside the cloud and understand how the disparate pieces of technology combine. This visibility is a requirement if organizations are to achieve 1) Installed VMware workstation on the machine the goals desired through the implementation of a cloud running windows. computing-based architecture: efficiency and scalability 2) Installed Ubuntu Cloud (OpenStack) on two of the virtual machines with 5.5GB of RAM and two processors each. IV – Proposed Work 3) Deployed Ubuntu server(precise) on both of We propose a multi-cloud model on a single physical the clouds. Machine using Virtualization Software. This model will help utilize resources more efficiently. 4) Launched instances in both the clouds The screenshots of the same are as follows:- 5) Connected to both the instances smoothly with 1) windows running in background as the host OS. A. Screen Shorts of the implemented work Part I – Instances generated in ubuntu cloud Fig. 1:Private Cloud 1 running 2) 486 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 1) Fig. 5: Connecting to instance 172.20.1.2 5) Fig. 3: No of instances created 2) Fig. 6:Connectecd to two instances on the same private cloud Fig.3:Connecting to an instance of IP 172.20.1.4 3) VI. CONCLUSION It is seen that there are many private clouds running on bare-metal hardware and still there is less resource utilization. So it is better to run multiple clouds on a single physical machine. This enables us to consolidate resources to a much more extent.This proposal is suitable for private clouds as there are less users compared to public clouds. Fig 4:Generated 2nd instance 172.20.1.2 in parallel VII. REFERENCES . 1.Daniel Nurmi, Rich Wolski, Sunil Soman and LamiaYouseff .Department of Computer Science 4) University of California.“The Eucalyptus Open Source Cloud Computing System”, IEEE Computer Society. 487 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 2. 2. K. Adams and O. Agesen. Acomparison of software and hardware techniques for x86 virtualization. In ASPLOSXII: Proceedings of the 12th international C.Shreeharsha,M.Tech(NIMS),VJTI conference on Architectural support for programming ,Matunga,Mumbai.Currently doing project work in languages and operating systems, pages 2–13, NewYork, NY, Cloud computing domain and want to pursue this in USA, 2006. ACM. the future. 3. D. GreschlerandT.Mangan. Networking lessons in delivering ’software as a service’: part ii. Int.J. Netw. Manag12(6):339–345, 2002. 4. P. Laplante, J. Zhang, and J. Voas. “What’s in a name?” distinguishing between saas and soa. IT Professional, 10(3):46–50, May-June 2008. 5. P. Barham,B.Dragovic,K. Fraser,S.Hand,T. Harris, A.Ho,R. Neugebauer,I. Pratt,andA.Warfield. Xen and the art of virtualization. In SOSP ’03: Proceedingsof the nineteenthACM symposium on Operating systems principles, pages 164–177, New York, NY, USA, 2003.ACM. 6. R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In Proceedings of the 10th IEEE International Conference on HighPerformance Computing and Communications (HPCC- 08, IEEE CS Press, Los Alamitos, CA, USA) 2008. 7. LamiaYouseff ,University of California, Santa Barbara Santa Barbara, CA 93106 lyouseff@cs.ucsb.edu “Toward a Unified Ontology of Cloud Computing” 8.Peng Li, Lee W. Toderick ,Department of Technology Systems, East Carolina University.”Cloud in Cloud – Approaches and Implementations” 9. Amazon simple storage service api (2006-03-01) – http://docs.amazonwebservices.com/ AmazonS3/2006-03- 01/. 10.OpenStack Administration Guide -www.openstack.org 10.. VMware home page – http://www.vmware.com 488 All Rights Reserved © 2012 IJARCET