SlideShare a Scribd company logo
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED
DATACENTERS
Abstract—As it has become the norm for cloud providers to host multiple datacenters around
the globe, significant demands exist for inter-datacenter data transfers in large volumes, e.g.,
migration of big data. A challenge arises on how to schedule the bulk data transfers at different
urgency levels, in order to fully utilize the available inter-datacenter bandwidth. The Software
Defined Networking (SDN) paradigm has emerged recently which decouples the control plane
from the data paths, enabling potential global optimization of data routing in a network. This
paper aims to design a dynamic, highly efficient bulk data transfer service in a geo-distributed
datacenter system, and engineer its design and solution algorithms closely within an SDN
architecture. We model data transfer demands as delay tolerant migration requests with different
finishing deadlines. Thanks to the flexibility provided by SDN, we enable dynamic, optimal
routing of distinct chunks within each bulk data transfer (instead of treating each transfer as an
infinite flow), which can be temporarily stored at intermediate datacenters to mitigate bandwidth
contention with more urgent transfers. An optimal chunk routing optimization model is
formulated to solve for the best chunk transfer schedules over time. To derive the optimal
schedules in an online fashion, three algorithms are discussed, namely a bandwidth-reserving
algorithm, a dynamically-adjusting algorithm, and a future-demandfriendly algorithm, targeting
at different levels of optimality and scalability. We build an SDN system based on the Beacon
platform and OpenFlow APIs, and carefully engineer our bulk data transfer algorithms in the
system. Extensive real-world experiments are carried out to compare the three algorithms as well
as those from the existing literature, in terms of routing optimality, computational delay and
overhead.
EXISTING SYSTEM:
In the network inside a data center, TCP congestion control and FIFO flow scheduling are
currently used for data flow transport, which are unaware of flow deadlines. A number of
proposals have appeared for deadline-aware congestion and rate control. D3 [12] exploits
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
deadline information to control the rate at which each source host introduces traffic into the
network, and apportions bandwidth at the routers along the paths greedily to satisfy as many
deadlines as possible. D2TCP [13] is a Deadline-Aware Datacenter TCP protocol to handle
bursty flows with deadlines. A congestion avoidance algorithm is employed, which uses ECN
feedback from the routers and flow deadlines to modify the congestion window at the sender. In
pFabric [14], switches implement simple prioritybased scheduling/dropping mechanisms, based
on a priority number carried in the packets of each flow, and each flow starts at the line rate
which throttles back only when high and persistent packet loss occurs. Differently, our work
focuses on transportation of bulk flows among datacenters in a geodistributed cloud. Instead of
end-to-end congestion control, we enable store-and-forward in intermediate datacenters, such
that a source data center can send data out as soon as the first-hop connection bandwidth allows,
whereas intermediate datacenters can temporarily store the data if more urgent/important flows
need the next-hop link bandwidths.
PROPOSED SYSTEM:
This paper proposes a novel optimization model for dynamic, highly efficient scheduling of bulk
data transfers in a geo-distributed datacenter system, and engineers its design and solution
algorithms practically within an OpenFlow-based SDN architecture. We model data transfer
requests as delay tolerant data migration tasks with different finishing deadlines. Thanks to the
flexibility of transmission scheduling provided by SDN, we enable dynamic, optimal routing of
distinct chunks within each bulk data transfer (instead of treating each transfer as an infinite
flow), which can be temporarily stored at intermediate datacenters and transmitted only at
carefully scheduled times, to mitigate bandwidth contention among tasks of different urgency
levels. Our contributions are summarized as follows. First, we formulate the bulk data transfer
problem into a novel, optimal chunk routing problem, which maximizes the aggregate utility
gain due to timely transfer completions before the specified deadlines. Such an optimization
model enables flexible, dynamic adjustment of chunk transfer schedules in a system with
dynamically-arriving data transfer requests, which is impossible with a popularly-modeled flow-
based optimal routing model. Second, we discuss three dynamic algorithms to solve the optimal
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
chunk routing problem, namely a bandwidth-reserving algorithm, a dynamically-adjusting
algorithm, and a futuredemand- friendly algorithm. These solutions are targeting at different
levels of optimality and computational complexity. Third, we build an SDN system based on the
OpenFlow APIs and Beacon platform [11], and carefully engineer our bulk data transfer
algorithms in the system. Extensive realworld experiments with real network traffic are carried
out to compare the three algorithms as well as those in the existing literature, in terms of routing
optimality, computational delay and overhead.
Module 1
Orchestrating in Cloud computing
The goal of cloud orchestration is to, insofar as is possible, automate the configuration,
coordination and management of software and software interactions in such an environment. The
process involves automating workflows required for service delivery. Tasks involved include
managing server runtimes, directing the flow of processes among applications and dealing with
exceptions to typical workflows. Vendors of cloud orchestration products include Eucalyptus,
Flexiant, IBM, Microsoft, VMware and V3 Systems. The term “orchestration” originally comes
from the study of music, where it refers to the arrangement and coordination of instruments for a
given piece.
Module 2
SDN-based Architecture
We consider a cloud spanning multiple datacenters located in different geographic locations (Fig.
1). Each datacenter is connected via a core switch to the other datacenters. The connections
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
among the datacenters are dedicated, fullduplex links, either through leading tier-1 ISPs or
private fiber networks of the cloud provider, allowing independent and simultaneous two-way
data transmissions. Data transfer requests may arise from each datacenter to move bulk volumes
of data to another datacenter. A gateway server is connected to the core switch in each
datacenter, responsible for aggregating cross-datacenter data transfer requests from the same
datacenter, as well as for temporarily storing data from other datacenters and forwarding them
via the switch. It also tracks network topology and bandwidth availability among the datacenters
with the help of the switches. Combined closely with the SDN paradigm, a central controller is
deployed to implement the optimal data transfer algorithms, dynamically configure the flow
table on each switch, and instruct the gateway servers to store or to forward each data chunk. The
layered architecture we present realistically resembles B4 [9], which was designed and deployed
by Google for their G-scale inter-datacenter network: the gateway server plays a similar role of
the site controller layer, the controller corresponds well to the global layer, and the core switch at
each location can be deemed as the per-site switch clusters in B4.
Module 3
Dynamic algorithms
We present three practical algorithms which make job acceptance and chunk routing decisions in
each time slot, and achieve different levels of optimality and scalability.
The Bandwidth-Reserving Algorithm The first algorithm honors decisions made in previous
time slots, and reserves bandwidth along the network links for scheduled chunk transmissions of
previously accepted jobs in its routing computation for newly arrived jobs. Let J(_ ) be the set
consisting of only the latest data transfer requests arrived in time slot _ . Define Bm;n(t) as the
residual bandwidth on each connection (m; n) in time slot t 2 [_ +1; �], excluding bandwidth
needed for the remaining chunk transfers of accepted jobs arrived before _ . In each time slot _ ,
the algorithm solves optimization (1) with job set J(_ ) and bandwidth Bm;n(t)’s for duration [_
+1; �], and derives admission control decisions for jobs arrived in this time slot, as well as their
chunk transfer schedules before their respective deadlines. Theorem 1 states the NP-hardness of
optimization problem in (1) (with detailed proof in Appendix A). Nevertheless, such a linear
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
integer program may still be solved in reasonable time at a typical scale of the problem (e.g., tens
of datacenters in the system), using an optimization tool such as CPLEX [26]. To cater for larger
scale problems, we also propose a highly efficient heuristic. .
The Dynamically-Adjusting Algorithm
The second algorithm retains job acceptance decisions made in previous time slots, but adjusts
routing schedules for chunks of accepted jobs, which have not reached their respective
destinations, together with the admission control and routing computation of newly arrived jobs.
Let J(_ ) be the set of data transfer requests arrived in time slot _ , and J(_�) represent the set of
unfinished, previously accepted jobs by time slot _ . In each time slot _ , the algorithm solves a
modified version of optimization (1)
Module 4
The Future-Demand-Friendly Heuristic
We further propose a simple but efficient heuristic to make job acceptance and chunk routing
decisions in each time slot, with polynomial-time computational complexity, suitable for systems
with larger scales. Similar to the first algorithm, the heuristic retains routing decisions computed
earlier for chunks of already accepted jobs, but only makes decisions for jobs received in this
time slot using the remaining bandwidth. On the other hand, it is more future demand friendly
than the first algorithm, by postponing the transmission of accepted jobs as much as possible, to
save bandwidth available in the immediate future in case more urgent transmission jobs may
arrive. Let J(_ ) be the set of latest data transfer requests arrived in time slot _ . The heuristic is
given in Alg. 1. At the job level, the algorithm preferably handles data transfer requests with
higher weights and smaller sizes (line 1), i.e., larger weight per unit bandwidth consumption. For
each chunk in job J, the algorithm chooses a transfer path with the fewest number of hops, that
has available bandwidth to forward the chunk from the source to the destination before the
deadline.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
CONCLUSION
This paper presents our efforts to tackle an arising challenge in geo-distributed datacenters, i.e.,
deadline-aware bulk data transfers. Inspired by the emerging Software Defined Networking
(SDN) initiative that is well suited to deployment of an efficient scheduling algorithm with the
global view of the network, we propose a reliable and efficient underlying bulk data transfer
service in an inter-datacenter network, featuring optimal routing for distinct chunks over time,
which can be temporarily stored at intermediate datacenters and forwarded at carefully computed
times. For practical application of the optimization framework, we derive three dynamic
algorithms, targeting at different levels of optimality and scalability. We also present the design
and implementation of our Bulk Data Transfer (BDT) system, based on the Beacon platform and
OpenFlow APIs. Experiments with realistic settings verify the practicality of the design and the
efficiency of the three algorithms, based on extensive comparisons with schemes in the literature.
REFERENCES
[1] Data Center Map, http://www.datacentermap.com/datacenters.html.
[2] K. K. Ramakrishnan, P. Shenoy, and J. Van der Merwe, “Live Data Center Migration across
WANs: A Robust Cooperative Context Aware Approach,” in Proceedings of the 2007
SIGCOMM workshop on Internet network management, ser. INM ’07, New York, NY, USA,
2007, pp. 262–267.
[3] Y. Wu, C. Wu, B. Li, L. Zhang, Z. Li, and F. C. M. Lau, “Scaling Social Media Applications
into Geo-Distributed Clouds,” in INFOCOM, 2012.
[4] J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters,”
Commun. ACM, vol. 51, no. 1, pp. 107–113, Jan. 2008.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
[5] A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan,
and H. Zhang, “A Clean Slate 4D Approach to Network Control and Management,” ACM
SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 41–54, 2005.
[6] SDN, https://www.opennetworking.org/sdn-resources/sdn-definition.
[7] N. McKeown, T. Anderson, H. Balakrishnan, G. M. Parulkar, L. L. Peterson, J. Rexford, S.
Shenker, and J. S. Turner, “OpenFlow: Enabling Innovation in Campus Networks,” Computer
Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
[8] U. Hoelzle, “Openflow@ google,” Open Networking Summit, 2012.
[9] S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J.
Zhou, M. Zhu et al., “B4: Experience with a Globally-deployed Software Defined WAN,” in
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. ACM, 2013, pp. 3–14.
[10] S. J. Vaughan-Nichols, “OpenFlow: The Next Generation of the Network?” Computer, vol.
44, no. 8, pp. 13–15, 2011.
[11] Beacon Home, https://openflow.stanford.edu/display/Beacon/Home.
[12] C. Wilson, H. Ballani, T. Karagiannis, and A. Rowtron, “Better Never than Late: Meeting
Deadlines in Datacenter Networks,” in Proceedings of the ACM SIGCOMM, New York, NY,
USA, 2011, pp. 50–61.

More Related Content

What's hot

Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
IJCNCJournal
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
IJCNCJournal
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
ijwmn
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
IJCNCJournal
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
ijngnjournal
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
IEEEFINALYEARPROJECTS
 
Opportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksOpportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networks
Shakas Technologies
 
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
IJCNCJournal
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
Sudha Hari Tech Solution Pvt ltd
 
Shared relay assignment (sra) for many to-one traffic in cooperative networks
Shared relay assignment (sra) for many to-one traffic in cooperative networksShared relay assignment (sra) for many to-one traffic in cooperative networks
Shared relay assignment (sra) for many to-one traffic in cooperative networks
finalsemprojects
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
shanofa sanu
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
IJCI JOURNAL
 

What's hot (15)

Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
10
1010
10
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...Enforcing end to-end proportional fairness with bounded buffer overflow proba...
Enforcing end to-end proportional fairness with bounded buffer overflow proba...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Opportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networksOpportunistic routing with congestion diversity in wireless ad hoc networks
Opportunistic routing with congestion diversity in wireless ad hoc networks
 
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Shared relay assignment (sra) for many to-one traffic in cooperative networks
Shared relay assignment (sra) for many to-one traffic in cooperative networksShared relay assignment (sra) for many to-one traffic in cooperative networks
Shared relay assignment (sra) for many to-one traffic in cooperative networks
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
40520130101003
4052013010100340520130101003
40520130101003
 

Viewers also liked

B2B is Different
B2B is DifferentB2B is Different
Hat giong tam hon 11
Hat giong tam hon 11Hat giong tam hon 11
Hat giong tam hon 11
khosachdientu2015
 
50 cong ty lam thay doi the gioi
50 cong ty lam thay doi the gioi50 cong ty lam thay doi the gioi
50 cong ty lam thay doi the gioi
Đặng Vui
 
Curriclum vitae
Curriclum vitae Curriclum vitae
Curriclum vitae
akram sadaqa
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
 
Tabling in the community_DULCE
Tabling in the community_DULCETabling in the community_DULCE
Tabling in the community_DULCENadia Tsado
 
Diversity in Organizations
Diversity in OrganizationsDiversity in Organizations
Diversity in Organizations
Zahra Jiwani
 
Pan Pacific Manila Certification
Pan Pacific Manila CertificationPan Pacific Manila Certification
Pan Pacific Manila CertificationFelovemyr Yusikee
 
บทเรียนที่ 1
บทเรียนที่ 1บทเรียนที่ 1
บทเรียนที่ 1
sripayom
 
Resume_amit shah_pic
Resume_amit shah_picResume_amit shah_pic
Resume_amit shah_picAmit Shah
 
MAPICS modules and database structures
MAPICS modules and database structuresMAPICS modules and database structures
MAPICS modules and database structures
Oktay Altındiş
 
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả ken planchard, dona...
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả   ken planchard, dona...Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả   ken planchard, dona...
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả ken planchard, dona...
khosachdientu2015
 
Overview of CIMM2 - A Unilog Product
Overview of CIMM2 - A Unilog ProductOverview of CIMM2 - A Unilog Product
Overview of CIMM2 - A Unilog Product
basuchit
 
Fase colaborativa momento3_116.
Fase colaborativa momento3_116.Fase colaborativa momento3_116.
Fase colaborativa momento3_116.
panelita64
 
Thay thai do_doi_cuoc_doi
Thay thai do_doi_cuoc_doiThay thai do_doi_cuoc_doi
Thay thai do_doi_cuoc_doi
khosachdientu2015
 
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033Shannon Williams
 
Tomorrowland succes story
Tomorrowland succes story Tomorrowland succes story
Tomorrowland succes story
Guillaume Solfrini
 
Cik izmaksā preču krājumu vadība
Cik izmaksā preču krājumu vadībaCik izmaksā preču krājumu vadība
Cik izmaksā preču krājumu vadība
StrongPoint
 
Creating A Cloud Computing in Education Strategy for Europe
Creating A Cloud Computing in Education Strategy for EuropeCreating A Cloud Computing in Education Strategy for Europe
Creating A Cloud Computing in Education Strategy for Europe
Karl Donert
 

Viewers also liked (20)

B2B is Different
B2B is DifferentB2B is Different
B2B is Different
 
Hat giong tam hon 11
Hat giong tam hon 11Hat giong tam hon 11
Hat giong tam hon 11
 
50 cong ty lam thay doi the gioi
50 cong ty lam thay doi the gioi50 cong ty lam thay doi the gioi
50 cong ty lam thay doi the gioi
 
Curriclum vitae
Curriclum vitae Curriclum vitae
Curriclum vitae
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
Tabling in the community_DULCE
Tabling in the community_DULCETabling in the community_DULCE
Tabling in the community_DULCE
 
Diversity in Organizations
Diversity in OrganizationsDiversity in Organizations
Diversity in Organizations
 
Pan Pacific Manila Certification
Pan Pacific Manila CertificationPan Pacific Manila Certification
Pan Pacific Manila Certification
 
บทเรียนที่ 1
บทเรียนที่ 1บทเรียนที่ 1
บทเรียนที่ 1
 
Resume_amit shah_pic
Resume_amit shah_picResume_amit shah_pic
Resume_amit shah_pic
 
MAPICS modules and database structures
MAPICS modules and database structuresMAPICS modules and database structures
MAPICS modules and database structures
 
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả ken planchard, dona...
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả   ken planchard, dona...Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả   ken planchard, dona...
Vị giám đốc một phút và xây dựng nhóm làm việc hiệu quả ken planchard, dona...
 
Overview of CIMM2 - A Unilog Product
Overview of CIMM2 - A Unilog ProductOverview of CIMM2 - A Unilog Product
Overview of CIMM2 - A Unilog Product
 
Fase colaborativa momento3_116.
Fase colaborativa momento3_116.Fase colaborativa momento3_116.
Fase colaborativa momento3_116.
 
Thay thai do_doi_cuoc_doi
Thay thai do_doi_cuoc_doiThay thai do_doi_cuoc_doi
Thay thai do_doi_cuoc_doi
 
Contratacion Internacional
Contratacion InternacionalContratacion Internacional
Contratacion Internacional
 
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033
Kliman-Williams, CJE advance access, Camb. J. Econ.-2014-Kliman-cje-beu033
 
Tomorrowland succes story
Tomorrowland succes story Tomorrowland succes story
Tomorrowland succes story
 
Cik izmaksā preču krājumu vadība
Cik izmaksā preču krājumu vadībaCik izmaksā preču krājumu vadība
Cik izmaksā preču krājumu vadība
 
Creating A Cloud Computing in Education Strategy for Europe
Creating A Cloud Computing in Education Strategy for EuropeCreating A Cloud Computing in Education Strategy for Europe
Creating A Cloud Computing in Education Strategy for Europe
 

Similar to ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS

Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
nexgentechnology
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
nexgentech15
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
Shakas Technologies
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
IJECEIAES
 
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
Shakas Technologies
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
Pvrtechnologies Nellore
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
tsysglobalsolutions
 
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSA NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
IJCNCJournal
 
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Shakas Technologies
 
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
Tal Lavian Ph.D.
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
eSAT Publishing House
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
eSAT Journals
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
1crore projects
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
jpstudcorner
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
IJCSIS Research Publications
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
Mukundhan Elumalai
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
Vijay Karan
 

Similar to ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS (20)

Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKSA NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
A NEW APPROACH TO STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS
 
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
 
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
DWDM-RAM: An Architecture for Data Intensive Service Enabled by Next Generati...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
Shakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Shakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
Shakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Shakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
Shakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS Abstract—As it has become the norm for cloud providers to host multiple datacenters around the globe, significant demands exist for inter-datacenter data transfers in large volumes, e.g., migration of big data. A challenge arises on how to schedule the bulk data transfers at different urgency levels, in order to fully utilize the available inter-datacenter bandwidth. The Software Defined Networking (SDN) paradigm has emerged recently which decouples the control plane from the data paths, enabling potential global optimization of data routing in a network. This paper aims to design a dynamic, highly efficient bulk data transfer service in a geo-distributed datacenter system, and engineer its design and solution algorithms closely within an SDN architecture. We model data transfer demands as delay tolerant migration requests with different finishing deadlines. Thanks to the flexibility provided by SDN, we enable dynamic, optimal routing of distinct chunks within each bulk data transfer (instead of treating each transfer as an infinite flow), which can be temporarily stored at intermediate datacenters to mitigate bandwidth contention with more urgent transfers. An optimal chunk routing optimization model is formulated to solve for the best chunk transfer schedules over time. To derive the optimal schedules in an online fashion, three algorithms are discussed, namely a bandwidth-reserving algorithm, a dynamically-adjusting algorithm, and a future-demandfriendly algorithm, targeting at different levels of optimality and scalability. We build an SDN system based on the Beacon platform and OpenFlow APIs, and carefully engineer our bulk data transfer algorithms in the system. Extensive real-world experiments are carried out to compare the three algorithms as well as those from the existing literature, in terms of routing optimality, computational delay and overhead. EXISTING SYSTEM: In the network inside a data center, TCP congestion control and FIFO flow scheduling are currently used for data flow transport, which are unaware of flow deadlines. A number of proposals have appeared for deadline-aware congestion and rate control. D3 [12] exploits
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com deadline information to control the rate at which each source host introduces traffic into the network, and apportions bandwidth at the routers along the paths greedily to satisfy as many deadlines as possible. D2TCP [13] is a Deadline-Aware Datacenter TCP protocol to handle bursty flows with deadlines. A congestion avoidance algorithm is employed, which uses ECN feedback from the routers and flow deadlines to modify the congestion window at the sender. In pFabric [14], switches implement simple prioritybased scheduling/dropping mechanisms, based on a priority number carried in the packets of each flow, and each flow starts at the line rate which throttles back only when high and persistent packet loss occurs. Differently, our work focuses on transportation of bulk flows among datacenters in a geodistributed cloud. Instead of end-to-end congestion control, we enable store-and-forward in intermediate datacenters, such that a source data center can send data out as soon as the first-hop connection bandwidth allows, whereas intermediate datacenters can temporarily store the data if more urgent/important flows need the next-hop link bandwidths. PROPOSED SYSTEM: This paper proposes a novel optimization model for dynamic, highly efficient scheduling of bulk data transfers in a geo-distributed datacenter system, and engineers its design and solution algorithms practically within an OpenFlow-based SDN architecture. We model data transfer requests as delay tolerant data migration tasks with different finishing deadlines. Thanks to the flexibility of transmission scheduling provided by SDN, we enable dynamic, optimal routing of distinct chunks within each bulk data transfer (instead of treating each transfer as an infinite flow), which can be temporarily stored at intermediate datacenters and transmitted only at carefully scheduled times, to mitigate bandwidth contention among tasks of different urgency levels. Our contributions are summarized as follows. First, we formulate the bulk data transfer problem into a novel, optimal chunk routing problem, which maximizes the aggregate utility gain due to timely transfer completions before the specified deadlines. Such an optimization model enables flexible, dynamic adjustment of chunk transfer schedules in a system with dynamically-arriving data transfer requests, which is impossible with a popularly-modeled flow- based optimal routing model. Second, we discuss three dynamic algorithms to solve the optimal
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com chunk routing problem, namely a bandwidth-reserving algorithm, a dynamically-adjusting algorithm, and a futuredemand- friendly algorithm. These solutions are targeting at different levels of optimality and computational complexity. Third, we build an SDN system based on the OpenFlow APIs and Beacon platform [11], and carefully engineer our bulk data transfer algorithms in the system. Extensive realworld experiments with real network traffic are carried out to compare the three algorithms as well as those in the existing literature, in terms of routing optimality, computational delay and overhead. Module 1 Orchestrating in Cloud computing The goal of cloud orchestration is to, insofar as is possible, automate the configuration, coordination and management of software and software interactions in such an environment. The process involves automating workflows required for service delivery. Tasks involved include managing server runtimes, directing the flow of processes among applications and dealing with exceptions to typical workflows. Vendors of cloud orchestration products include Eucalyptus, Flexiant, IBM, Microsoft, VMware and V3 Systems. The term “orchestration” originally comes from the study of music, where it refers to the arrangement and coordination of instruments for a given piece. Module 2 SDN-based Architecture We consider a cloud spanning multiple datacenters located in different geographic locations (Fig. 1). Each datacenter is connected via a core switch to the other datacenters. The connections
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com among the datacenters are dedicated, fullduplex links, either through leading tier-1 ISPs or private fiber networks of the cloud provider, allowing independent and simultaneous two-way data transmissions. Data transfer requests may arise from each datacenter to move bulk volumes of data to another datacenter. A gateway server is connected to the core switch in each datacenter, responsible for aggregating cross-datacenter data transfer requests from the same datacenter, as well as for temporarily storing data from other datacenters and forwarding them via the switch. It also tracks network topology and bandwidth availability among the datacenters with the help of the switches. Combined closely with the SDN paradigm, a central controller is deployed to implement the optimal data transfer algorithms, dynamically configure the flow table on each switch, and instruct the gateway servers to store or to forward each data chunk. The layered architecture we present realistically resembles B4 [9], which was designed and deployed by Google for their G-scale inter-datacenter network: the gateway server plays a similar role of the site controller layer, the controller corresponds well to the global layer, and the core switch at each location can be deemed as the per-site switch clusters in B4. Module 3 Dynamic algorithms We present three practical algorithms which make job acceptance and chunk routing decisions in each time slot, and achieve different levels of optimality and scalability. The Bandwidth-Reserving Algorithm The first algorithm honors decisions made in previous time slots, and reserves bandwidth along the network links for scheduled chunk transmissions of previously accepted jobs in its routing computation for newly arrived jobs. Let J(_ ) be the set consisting of only the latest data transfer requests arrived in time slot _ . Define Bm;n(t) as the residual bandwidth on each connection (m; n) in time slot t 2 [_ +1; �], excluding bandwidth needed for the remaining chunk transfers of accepted jobs arrived before _ . In each time slot _ , the algorithm solves optimization (1) with job set J(_ ) and bandwidth Bm;n(t)’s for duration [_ +1; �], and derives admission control decisions for jobs arrived in this time slot, as well as their chunk transfer schedules before their respective deadlines. Theorem 1 states the NP-hardness of optimization problem in (1) (with detailed proof in Appendix A). Nevertheless, such a linear
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com integer program may still be solved in reasonable time at a typical scale of the problem (e.g., tens of datacenters in the system), using an optimization tool such as CPLEX [26]. To cater for larger scale problems, we also propose a highly efficient heuristic. . The Dynamically-Adjusting Algorithm The second algorithm retains job acceptance decisions made in previous time slots, but adjusts routing schedules for chunks of accepted jobs, which have not reached their respective destinations, together with the admission control and routing computation of newly arrived jobs. Let J(_ ) be the set of data transfer requests arrived in time slot _ , and J(_�) represent the set of unfinished, previously accepted jobs by time slot _ . In each time slot _ , the algorithm solves a modified version of optimization (1) Module 4 The Future-Demand-Friendly Heuristic We further propose a simple but efficient heuristic to make job acceptance and chunk routing decisions in each time slot, with polynomial-time computational complexity, suitable for systems with larger scales. Similar to the first algorithm, the heuristic retains routing decisions computed earlier for chunks of already accepted jobs, but only makes decisions for jobs received in this time slot using the remaining bandwidth. On the other hand, it is more future demand friendly than the first algorithm, by postponing the transmission of accepted jobs as much as possible, to save bandwidth available in the immediate future in case more urgent transmission jobs may arrive. Let J(_ ) be the set of latest data transfer requests arrived in time slot _ . The heuristic is given in Alg. 1. At the job level, the algorithm preferably handles data transfer requests with higher weights and smaller sizes (line 1), i.e., larger weight per unit bandwidth consumption. For each chunk in job J, the algorithm chooses a transfer path with the fewest number of hops, that has available bandwidth to forward the chunk from the source to the destination before the deadline.
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com CONCLUSION This paper presents our efforts to tackle an arising challenge in geo-distributed datacenters, i.e., deadline-aware bulk data transfers. Inspired by the emerging Software Defined Networking (SDN) initiative that is well suited to deployment of an efficient scheduling algorithm with the global view of the network, we propose a reliable and efficient underlying bulk data transfer service in an inter-datacenter network, featuring optimal routing for distinct chunks over time, which can be temporarily stored at intermediate datacenters and forwarded at carefully computed times. For practical application of the optimization framework, we derive three dynamic algorithms, targeting at different levels of optimality and scalability. We also present the design and implementation of our Bulk Data Transfer (BDT) system, based on the Beacon platform and OpenFlow APIs. Experiments with realistic settings verify the practicality of the design and the efficiency of the three algorithms, based on extensive comparisons with schemes in the literature. REFERENCES [1] Data Center Map, http://www.datacentermap.com/datacenters.html. [2] K. K. Ramakrishnan, P. Shenoy, and J. Van der Merwe, “Live Data Center Migration across WANs: A Robust Cooperative Context Aware Approach,” in Proceedings of the 2007 SIGCOMM workshop on Internet network management, ser. INM ’07, New York, NY, USA, 2007, pp. 262–267. [3] Y. Wu, C. Wu, B. Li, L. Zhang, Z. Li, and F. C. M. Lau, “Scaling Social Media Applications into Geo-Distributed Clouds,” in INFOCOM, 2012. [4] J. Dean and S. Ghemawat, “MapReduce: Simplified Data Processing on Large Clusters,” Commun. ACM, vol. 51, no. 1, pp. 107–113, Jan. 2008.
  • 7. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com [5] A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, “A Clean Slate 4D Approach to Network Control and Management,” ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 41–54, 2005. [6] SDN, https://www.opennetworking.org/sdn-resources/sdn-definition. [7] N. McKeown, T. Anderson, H. Balakrishnan, G. M. Parulkar, L. L. Peterson, J. Rexford, S. Shenker, and J. S. Turner, “OpenFlow: Enabling Innovation in Campus Networks,” Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. [8] U. Hoelzle, “Openflow@ google,” Open Networking Summit, 2012. [9] S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu et al., “B4: Experience with a Globally-deployed Software Defined WAN,” in Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM. ACM, 2013, pp. 3–14. [10] S. J. Vaughan-Nichols, “OpenFlow: The Next Generation of the Network?” Computer, vol. 44, no. 8, pp. 13–15, 2011. [11] Beacon Home, https://openflow.stanford.edu/display/Beacon/Home. [12] C. Wilson, H. Ballani, T. Karagiannis, and A. Rowtron, “Better Never than Late: Meeting Deadlines in Datacenter Networks,” in Proceedings of the ACM SIGCOMM, New York, NY, USA, 2011, pp. 50–61.