This document provides an overview of ANEKA, a cloud application platform developed by Manjrasoft Pvt. Ltd. that allows for building and managing distributed applications and multiple clouds. It discusses cloud computing concepts and the need for multiple clouds and resource management. ANEKA addresses issues with existing approaches by providing programming models, tools, and APIs to deploy scalable applications across distributed networks and clouds. The document outlines ANEKA's architecture, functions for building, deploying, and managing applications, and compares its programming models including Task, Thread, MapReduce, and Parameter Sweeping. In summary, ANEKA is a platform that enables development of applications for multiple cloud environments and distributed networks through its programming abstractions and
- Problems with traditional data centers.
- Cloud computing definition, deployment, and services models.
- Essential characteristics of cloud services.
- IaaS examples.
- PaaS examples.
- SaaS examples.
- Cloud enabling technologies such as grid computing, utility computing, service oriented architecture (SOA), The Internet, Multi-tenancy, Web 2.0, Automation and Virtualization.
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
- Problems with traditional data centers.
- Cloud computing definition, deployment, and services models.
- Essential characteristics of cloud services.
- IaaS examples.
- PaaS examples.
- SaaS examples.
- Cloud enabling technologies such as grid computing, utility computing, service oriented architecture (SOA), The Internet, Multi-tenancy, Web 2.0, Automation and Virtualization.
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Cloud computing introduction and concept as per the RGPV, BE syllabus. PPt contains the material from various cloud Draft (NIST) and other research material to fulfill the Syllabus requirement.
Cloud Computing Technology
Cloud Architecture
Cloud Modeling and Design
Foundation Grid
Cloud and Virtualization
Virtualization and Cloud Computing.
Cloud Lifecycle model
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
Cloud computing introduction and concept as per the RGPV, BE syllabus. PPt contains the material from various cloud Draft (NIST) and other research material to fulfill the Syllabus requirement.
Cloud Computing Technology
Cloud Architecture
Cloud Modeling and Design
Foundation Grid
Cloud and Virtualization
Virtualization and Cloud Computing.
Cloud Lifecycle model
Trust models for Grid security environment – Authentication and Authorization methods – Grid security infrastructure – Cloud Infrastructure security: network, host and application level – aspects of data security, provider data and its security, Identity and access management architecture, IAM practices in the cloud, SaaS, PaaS, IaaS availability in the cloud, Key privacy issues in the cloud.
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid cloud would be a blend of two or many kinds of clouds. Because as clouds become increasingly common, safety issues also expanding. Because of such cybersecurity threats, numerous experts suggested procedures as well as ways to assure internet confidentiality. Providers of cloud-based services were accountable for the complete safety of cloud information. Nevertheless, since the clouds are accessible (easily accessible over the World wide web), much research has been conducted on cloud storage cybersecurity. This paper describes methods for enhancing security and reliability in decentralized cloud-based solutions, as well as suggests a few security solution methods of implementation.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
Cloud computing is an emerging computing technology that maintains computational resources on large data centers and accessed through internet, rather than on local computers. VM migration provides the capability to balance the load, system maintenance, etc. Virtualization technology gives power to cloud computing. The virtual machine migration techniques can be divided into two categories that is pre copy and post copy approach. The process to move running applications or VMs from one physical machine to another is known as VM migration. In migration process the processor state, storage, memory and network connection are moved from one host to another.. Two important performance metrics are downtime and total migration time that the users care about most, because these metrics deals with service degradation and the time during which the service is unavailable. This paper focus on the analysis of live VM migration Techniques in cloud computing. Khushbu Singh Chandel | Dr. Avinash Sharma "Virtual Machine Migration and Allocation in Cloud Computing: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29556.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/29556/virtual-machine-migration-and-allocation-in-cloud-computing-a-review/khushbu-singh-chandel
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Review and Classification of Cloud Computing Researchiosrjce
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is a double blind peer reviewed International Journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
Design and realization of microelectronic systems using VLSI/ULSI technologies require close collaboration among scientists and engineers in the fields of systems architecture, logic and circuit design, chips and wafer fabrication, packaging, testing and systems applications. Generation of specifications, design and verification must be performed at all abstraction levels, including the system, register-transfer, logic, circuit, transistor and process levels
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Introduction to aneka cloud
1. 490 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
Introduction to ANEKA Cloud Application Platform by
MANJRASOFT – An Overview
Ms. Disha Grover
Asst. Prof (IT), Jagan Institute of Management Studies, Delhi, India
Dr. BarjeshKochar
Prof.,CSE Department, BPIT, Delhi, India
Dr. Y.S.Shishodia
Pro Vice Chancellor, Jagannath University, Jaipur, India
Abstract
With advancement in technology trends, facilities are
increasing day by day and services are available at our
doorstep.Cloud computing is one of emerging areas that
is prevailing in industries at grandiose rate. The paper
deals with aspects of cloud computing and models to
deploy them. It is common information which is known
by most of researchers. The main problem is
management of resources that leads to multiple clouds.
So, there must be some platform or framework for
building clouds and managing them in an effective way.
The paper makes readers aware of finest software that is
used for building clouds among distributed networks and
creates multiple clouds. It is given name as ANEKA by
one of company MANJRASOFT Pvt. Ltd. Several
programming models and process of deployment of
resources in ANEKA have been shown in following
paper. It is known that multiple clouds are used to reduce
risk of fault tolerance but these clouds are built by
ANEKA. Without ANEKA, it is very difficult to build
multiple clouds and manage them in heterogeneous
environment. ANEKA is proven to be one of scalable and
reliable technologies in cloud terminology.
Keywords
Cloud computing, Network models, ANEKA, and
Programming models.
Related Work
There is continuous research going in field of cloud
computing because every organization, company
wants to implement cloud in their systems. It is
mainly due to many reasons like for increasing
utilization, increasing company share and profit,
reduce cost, achieve scalability and reduce
workload management. The main strategy behind
introducing of multiple clouds is enhancing process
of virtualization. It is known that for using multiple
virtual machines to access data also requires
management of data and its collection. Few
techniques that were used by various scientists and
programmers are as follows:
Automatic workload balancing [1]: - It is
technique of predicting expected workload on
respective servers in form of number of requests
that estimates performance of model on basis of
various problems.
Reusability mechanism[2]:- Reusability
decreases amount of data by using live virtual
machines (VM) and it is dynamic process with
shorter time.
Linear Scheduling Tasks and Resources
(LSTR) [3]: - It deals with scheduling criteria of
operating system. It involves quality of service on
basis of their priority like cost, demand etc.
Above techniques have been proven useful to a
certain limit but in case of large and distributive
servers where data access limit is large, none of
them has done right job. They lack in management
of resources and scheduling services of various data
centers at one time. These data centers can be called
as clusters or containers.
1. INTRODUCTION
Before going to ANEKA overview, the paper has
discussed the concept of cloud computing to basic
readers. In 1990’s, there used to be single server
systems that takes huge time in computation of
resources. They may even take years to process one
request. With advent of time, things and technology
keeps on growing. More complex environments
have come that requires use of distributed
information resources among several levels of
abstraction. The only way to distribute resources
2. 491 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
evenly is availability of centralized data servers in
cloud environments. So, this lead to development of
multiple clouds and way to manage them is done by
using ANEKA Management Studio.
On basis of cloud computing services, there are four
layers viz User Layer, Service Provider layer,
Virtualization Layer and Data Center layer.
Layer Components Security
Issues
End User or
User layer
Cloud
applications,
programming
tools and
environment.
Security as a
Service,
Browser
Security and
Authentication
Service
Provider
Layer
Service Level
Agreements
(SLA)
Monitoring,
Scheduler and
Dispatcher,
Load Balancer,
Policy
Management.
Identity,
Infrastructure,
Privacy, Audit
and
Compliance,
Cloud
Integrity.
Virtualization
layer
Number of
Virtual
Machines,
Number of
operating
systems and its
monitoring.
VM escape,
Infrastructure,
Identity and
Access
Management.
Data Center
Layer
Servers,
CPU’s,
Memory and
Hardware.
Data Storage,
Network and
Server.
Table 1: Security – major concern in Cloud
computing [7]
There are several hindrances in cloud provider’s
path as follows:
Most of companies don’t know about cloud
and its benefits.
There is lack of some programming model
that must be building in order to access multiple
services.
Lack of tools and API’s for processing and
deployment of scalable applications.
Lack of standard interfaces and classes to
implement virtualization and resources
management.
Due to violation of terms and agreements of
services.
Lack of portability and scalability in
applications dealing with various API’s and
modules.
The paper has following sections: Section 2 deals
with cloud computing basic deployment models and
need of multiple clouds in architecture. Section 3
deals with overview of ANEKA. It presents benefits
and major functions of ANEKA. Section 4 deals
with architecture of ANEKA consisting of various
modules attached with services and tasks. It also
depicts comparison among four programming
models of ANEKA. Section 5 concludes the
following paper.
2. BUILDING CLOUD BASED APPLICATION
In general, there are two ways by which cloud
application can be built. The application designed
may be of high level and low level.
High level applications are built using platform and
software like Google App Engine, Microsoft Azure,
ANEKA and Amazon Web Services. Low level
applications are built by using services provided by
Infrastructure as a Service (IaaS) layer of cloud
computing architecture. The layer provides API’s
that helps in creation and management of resources
including storage and scheduling services.
Examples of IaaS cloud service providers include
Amazon EC2, Eucalyptus, Sun Cloud, GoGrid and
many more [9]. There are many providers but to
select from one of them is difficult and confusing
task.
Software Infrastructure: - It provides network
resources to two layers namely: Software
environment and Application layer above it. This
layer leads to generation of new software
environments and applications that will be delivered
to end users in form of services.
Services in this layer are as follows:
(i) Computational resources (IaaS) also called
Infrastructure as a service. This is available to
customers in form of virtual machines (VM). Cloud
provider offers computing resources to users
without changing the physical infrastructure of data
centers. IaaS allocates resources among various
virtual servers.Examples of clouds that offer IaaS
are Amazon elastic compute cloud(EC2), Reservoir
architecture [8]
3. 492 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
(ii) Data Storage as a Service (DaaS): - It stores
data of users on servers located in remote locations.
Users can access their information via web.
Examples of clouds in DaaS are Amazon S3 (simple
storage device), zector zumodrive.
(iii) CaaS (communication as a service):- It
provides communication that is reusable,
schedulable, configurable and also encrypted.
Examples include VOIP (Voice over internet
telephone), E-mail and Video conferencing.
2.1. Basic Deployment Models of Computing
They are also referred to as cloud computing types-
Public Cloud, Private Cloud and Hybrid Cloud.
Public Clouds: - They provide services to anyone
globally with an Internet connection. E.g. YouTube
and yahoo are sites from which user access data in
form of emails, attachments, videos from any
device that has internet connection.
Private Clouds: - They provide services privately
with limited number of people using that network.
Hybrid Cloud: - It is combination of both public
and private cloud models. It has features of public
as well as private cloud to, manage workload on
cloud.
S.No. Public
Cloud
Private
Cloud
Hybrid
Cloud
1. Simple and
easy to
use.
Monitoring
is needed
to control
latest
software
updates
Most
efficient
(combination
of both)
2. Widely
accessible.
limited
accessible
Used to
reduce work
load.
3. Less costly
and
reliable
More
costly and
less
reliable
Most costly
and most
reliable.
4. Suitable
for
handling
large
workload
pressure
Not
suitable for
large
workload
pressure
Suitable for
handling
large
workload
pressure
Table 2: Differences among deployment models
[4]
2.2Need of Multiple Clouds and Management of
Resources
Multiple clouds are developed to reduce risks that
are generated by unreliable services in order to
achieve fault tolerance. Utilization of multiple
clouds requires management of cloud interfaces by
using cloud applications to be run on different
operating systems.
Need of Resource Management: - It is needed to
monitor, maximize and distribute the computational
resources available from each cloud vendors having
protocols in different layers like physical layer,
platform layer, metaphor layer, communication
layer, management layer and end points layer.
3. DEALING WITH ANEKA
Fig 1: ANEKA Quick Overview
About ANEKA: - ANEKA is one of first platform for
developing applications on cloud. It utilizes extra
CPU cycles in order to access desktop services from
heterogeneous networks. It is market oriented
platform or framework which means that it is
possible to build, schedule, monitor results by giving
some money for using IT services like Quality of
Service (QoS) in both public as well as private
clouds.
Objective: - Support open-ended set of abstractions
and features for distributed computing and
deployment scenarios. Abstractions mean set of
resources and their instances. These instances are
extended by implementing the base classes of
Programming models (Task, Thread, Parameter and
MapReduce).
Position of ANEKA in cloud architecture: -
ANEKA is available at PaaS in cloud environment.
In this layer, it provides various application
interfaces used for developing distributed
environment and multiple clouds and execute them.
Virtualization in ANEKA: ANEKA cloud is
combination of multiple resources connected to each
other in a network. These resources can be modified
as per user demands by using Virtualization.
ANEKA Governing Body: MANJRASOFT
MANJRASOFT Pvt. Ltd. Is one of organization that
works on cloud computing technology by developing
software compatible with distributed networks across
multiple servers.
4. 493 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
3.1 ANEKA Basic Functions
(a) BUILD: -
ANEKA builds environment with the help of
software development kit (SDK) consisting of
various tools and packages that leads to creation of
new applications to run on multiple servers. It
requires use of Design explorer which is type of
GUI to identify data types in applications. The
layout of design explorer is shown further.
(b) Deployment and Development: -
(i) Deployment involves use of design explorer in
addition to some thread model facility like
parameter sweeping. It is defined as generating
different versions of same application. In
programming term, it is called as overloading.
(ii) It makes aware of linguistic features that help to
access resources from existing applications in faster
time.
(iii) This phase requires development of application
only one time and then uses that application in
multiple environments. It supports virtual machines
as well as physical machines in cloud environment.
(iv) ANEKA maintains queue and put some
applications in queue for further execution.
(c) Manage
It deals with ANEKA Management Studio that
consists of various interfaces, console, uninstalled
machines, installed machines, credentials and many
more. This studio performs many tasks like quick
installation of desktop services, provides interface
for using design explorer, dynamic allocation of
resources at run time in order to achieve high
scalability, pay per usage service, allows flexibility
and modularity in usage of resources an detection of
services that are violating SLA’s. It has container
that consists of scheduler, executor for providing
various services at run time.
The following page shows ANEKA cloud
application framework.
4. ANEKA FRAMEWORK
5. 494 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
Fig 1: Detailed View of ANEKA architecture
The Design Explorer of ANEKA is shown pictorially as:
ANEKA Multiple CLOUD Combination
Private Cloud: (Data Centers, Uses Desktop
services like execution, fabric etc) Public Cloud: Cloud providers (GoGrid,
Azure, Amazon EC2)
+
Integration into ANEKA
AMAZON AZURE
6. 495 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
4.1 Comparison among programming models of ANEKA
Feature Task
programming
Model
Thread
Programming
Model
MapReduce
programming Model [5]
Parameter
Sweeping
Model
Type Basic general
model
Low level High Level Rapid prototype
Operations Submit and forget Start, Stop, State
Query and Join
Map (map ::( key1,
value1)= list (key2, value
2)
Reduce (reduce: (key2,
list value 2) = list (value
3)
Parallelism
Usage Legacy
applications
Distributed
network systems
Data mining and analytics Legacy
applications
Middleware No No yes yes
User domain yes Yes No No
Task Based Yes Yes No No
Function Based No No yes yes
Examples Convolution,
Excel Grid
Mandelbrot word counter
5. CONCLUSION
ANEKA is one of first platform for developing
applications on cloud. It utilizes extra CPU cycles
in order to access desktop services from
heterogeneous networks. It is market oriented
platform or framework which means that it is
possible to build, schedule, monitor results by
giving some money for using IT services like
Quality of Service (QoS) in both public as well as
private clouds. It supports open-ended set of
abstractions and features for distributed computing
and deployment scenarios. Abstractions mean set
of resources and their instances. These instances are
extended by implementing the base classes of
Programming models (Task, Thread, Parameter and
MapReduce).
The paper deals with features of ANEKA
describing its architecture and comparison among
various models of computing. ANEKA has wide
GUI that helps in building cloud environment on
installed systems.
REFERENCES
[1]. Quiroz A, Kim H, Parashar M, Gnanasambandam N,
Sharma N, 2009, “Towards workload provisioning
for enterprise grids and clouds”,IEEE/ACM
international conference on grid computing. pp 50-
57.
[2]. Soramichi Akiyama, Takahiro Hirofuchi, Ryousei
Takano, Shinichi Honiden, 2012, “MiyakoDori: A
Memory Reusing Mechanism for Dynamic VM
Consolidation”, Fifth International Conference on
Cloud Computing, IEEE 2012.
[3]. Abirami S.P., ShaliniRamanathan, 2012 “Linear
Scheduling Strategy for Resource allocation in
CloudEnvironment”,InternationalJournal on Cloud
Computing and Architecture vol.2, No.1, February.
[4]. RajkumarBuyya, Chee Shin Yeo,
SrikumarVenugopal, James Broberg, and
IvonaBrandic, Cloud Computing and Emerging IT
Platforms: Vision, Hype, and Reality for Delivering
Computing as the 5th Utility, Future Generation
Computer Systems, 25(6):599-616, Elsevier Science,
Amsterdam, The Netherlands, June 2009.
[5]. Chao Jin, RajkumarBuyya, MapReduce
Programming Model for .NET-Based Cloud
Computing, Euro-Par 2009: 417-428.
7. 496 Ms. Disha Grover, Dr. BarjeshKochar, Dr. Y.S.Shishodia
International Journal of Engineering Technology Science and Research
IJETSR
www.ijetsr.com
ISSN 2394 – 3386
Volume 4, Issue 6
June 2017
[6] Sanjay Ghemawat and Jeffrey Dean, MapReduce:
Simplified Data Processing on Large Clusters,
Symposium on Operating System Design and
Implementation (OSDI’04), San Francisco, CA,
USA, 2004
[7]. Michael Armbrust, Armando Fox, Rean Griffith,
Anthony D. Joseph, Randy Katz, Andy Konwinski,
Gunho Lee, David Patterson, Ariel Rabkin, Ion
Stoica, MateiZaharia, A View of Cloud Computing,
Communications of the ACM, Vol. 53 No. 4, Pages
50-58, 2010
[8]. Rao Mikkilineni, Vijay Sarathy "Cloud Computing
and Lessons from the Past", Proceedings of IEEE
WETICE 2009, First International Workshop on
Collaboration & Cloud Computing, June 2009.
[9].Dan Sullivan, “The Definitive Guide to Cloud
Computing”, Realtime Publishers