VINEY SHARMA - Academia.edu (original) (raw)
Papers by VINEY SHARMA
Proceedings of the 24th International Conference on Distributed Computing and Networking
Cloud computing is a novel computing model, involving resource outsourcing with Infinite and flex... more Cloud computing is a novel computing model, involving resource outsourcing with Infinite and flexible resource scalability and "plug and play" provisioning. The recent materialization of this new computing model has radically changed everyone's perception of infrastructure paradigm, development models and delivery of software. It is revolutionizing the IT industry by enabling them to offer access to their infrastructure and application services on a "payas-you-use" basis. As a result, several enterprises including IBM, Microsoft, Google and Amazon have started to offer different Cloud services to their customers [1]. It inherits many features from Grid Computing and Utility Computing. Cloud computing has come out as a model to deliver on demand resources to consumers similar to other utilities like electricity, gas, water. Earlier, small and medium enterprises had to make high capital investment for procuring IT infrastructure, manpower which results in a high cost of ownership. Cloud computing aims to deliver services that user can access from anywhere, irrespective of their location, on subscription basis. Therefore, these enterprises now need not to make large investment in hardware to deploy their services or human power. It frees them from setting up IT infrastructures and thus enables them to focus on innovation. Enterprises have taken fast move in developing services based upon this new model. Unfortunately, everything is not on positive side. Many challenges are ahead to exploit the full capabilities that Cloud computing undertakes. Cloud systems are less expensive to operate, consume less energy, and have higher utilization rates than traditional datacenters, which lead to the belief that much of the work done in traditional datacenters today will be pushed to the cloud by the end of the decade 1.2 Definition The National Institute of Standards and Technology (NIST) [7] has defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources, e.g. networks, servers, storage, applications, and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction. In contrast to the conventional computing model, where end-user data and computing power are located in the user computer systems, Cloud computing resources are provided in massive, Virtualized infrastructures managed by professional service providers [6]. 1.3 Service Models Cloud Computing Architecture offers following Service Models. A. Infrastructure as a Service (IaaS)-Cloud clients directly use IT infrastructures which may include computing, storage, network elements, and other essential computing resources available in the IaaS cloud. Virtualization plays a vital role in IaaS cloud in order to assimilate or divide physical resources to meet rapidly changing resource demand from Cloud consumers [2]. Virtualization creates independent Virtual Machines (VM) that are separated from both the underlying hardware and other VMs. IaaS allows clients to deploy, run and have limited control over software like applications and Operating Systems. The service of Virtualized storage on demand is sometimes considered as a special type of IaaS and otherwise as separate Data Storage as a Service (DaaS) [2]. Amazon offers this service in the form of ECC cloud, S3 cloud [32]. B. Platform as a Service (PaaS)-PaaS offers complete software development platform facilitating cloud clients to develop cloud services and applications directly on the PaaS cloud. Infact Cloud PaaS is the use of tools and resources running on a cloud infrastructure to provide services to end-users. Clients can develop applications on top of the tools provided. Clients do not have control over the underlying infrastructure or operating systems, but on deployment of individual applications. Microsoft Windows Azure and Google App Engine are examples of PaaS providers[3,32]. C. Software as a Service (SaaS)-Cloud SaaS is the use of applications running on a cloud infrastructure to provide services to end-users. SaaS can deliver business applications such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), and Accounting etc. Examples of cloud SaaS are Google Apps [3,32] and Salesforce CRM. The difference between SaaS and PaaS is that SaaS only hosts developed cloud applications whereas PaaS offers a development platform that clients may use in order to develop their applications. This requires PaaS, in addition to supporting application hosting environment, to possess a complete development platform including programming environment, tools, and configuration management [32]. 1.4 Deployment Models Currently four Cloud deployment models are prevalent. A. Private Cloud-The Cloud infrastructure is operated exclusively within a single organization, and managed by the organization or a third party. It may be positioned within boundary of organization or outside [2, 32]. Objectives to setup a private cloud within an organization may be to optimize the utilization of available in-house resources, need for secure data access and trust, full control over sensitive and secret activities, fulfill need of academicians to build Private Cloud for research activities. B. Community Cloud-Several organizations working on some mission jointly deploy and share the same Cloud infrastructure as well as policies, decisions and values. The cloud infrastructure could be hosted by an either third-party vendor or one of the organizations in the community can take responsibility of hosting Cloud infrastructure [3, 32]. C. Public Cloud-This is the most pervasive structure of Cloud computing deployment model. The Public Cloud is used by the general public Cloud consumers. Here custody of policy framing rights and responsibility issues lies more with service providers rather than consumers [6]. Cloud service provider has full ownership of the Public Cloud with its own policy, value, profit, costing, and charging model. Examples of popular Public Cloud services are Amazon EC2, S3, Google AppEngine, and Force.com [32].
Cloud computing has taken the world in its strides. In cloud datacentres, thousands of physical m... more Cloud computing has taken the world in its strides. In cloud datacentres, thousands of physical machines run continuously to execute incoming workload. Virtual machines are provisioned to incoming requests and are allocated to physical machines. Efficient mapping of virtual machines to physical machines has potential impact on the efficiency of datacentres. This paper proposes two greedy heuristics for virtual machines to physical machines mapping. We have empirically evaluated proposed heuristics and existing greedy heuristics for comprehensive datasets including PlanetLab datasets. Thereafter we have considered issue of hotspot, and proposed two heuristics for hotspot mitigation. We have evaluated our proposed hotspot mitigation heuristics for wide varieties of cases and case of SLA violation is also taken into consideration. Extensive simulation shows that our proposed heuristics are substantially faster than their counterparts. As clouds have strong business perspective also, ou...
Sharing of information and resources among different devices require networking. As networks are ... more Sharing of information and resources among different devices require networking. As networks are expanding day by day, Internet Protocols are gaining more and more popularity. Different transition mechanisms have been established and yet a lot of research is to be carried out. Internet Protocol version 6 (IPv6) is the next generation Internet Protocol proposed by the Internet Engineering Task Force (IETF) to supersede the current Internet Protocol version 4 (IPv4). To enable the integration of IPv6 into current networks, several transition mechanisms have been proposed by the IETF IPng Transition Working Group. This work examines and empirically evaluates two transition mechanisms, namely 6-over-4, and IPv6 in IPv4 tunneling, as they relate to the performance of IPv6.This paper outlines many of the common known threats against IPv4 and then compares and contrasts how these threats, or similar ones, might affect an IPv6 network. Some new threats specific to IPv6 are also considered. The current capabilities of available products are evaluated, as is how any inherent protocol characteristics of IPv6 affect the nature of the threat. This is prefaced by a brief overview of current best practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.
International Journal of Business Information Systems, 2016
2013 Sixth International Conference on Contemporary Computing (IC3), 2013
2013 Sixth International Conference on Contemporary Computing (IC3), 2013
Proceedings of the 24th International Conference on Distributed Computing and Networking
Cloud computing is a novel computing model, involving resource outsourcing with Infinite and flex... more Cloud computing is a novel computing model, involving resource outsourcing with Infinite and flexible resource scalability and "plug and play" provisioning. The recent materialization of this new computing model has radically changed everyone's perception of infrastructure paradigm, development models and delivery of software. It is revolutionizing the IT industry by enabling them to offer access to their infrastructure and application services on a "payas-you-use" basis. As a result, several enterprises including IBM, Microsoft, Google and Amazon have started to offer different Cloud services to their customers [1]. It inherits many features from Grid Computing and Utility Computing. Cloud computing has come out as a model to deliver on demand resources to consumers similar to other utilities like electricity, gas, water. Earlier, small and medium enterprises had to make high capital investment for procuring IT infrastructure, manpower which results in a high cost of ownership. Cloud computing aims to deliver services that user can access from anywhere, irrespective of their location, on subscription basis. Therefore, these enterprises now need not to make large investment in hardware to deploy their services or human power. It frees them from setting up IT infrastructures and thus enables them to focus on innovation. Enterprises have taken fast move in developing services based upon this new model. Unfortunately, everything is not on positive side. Many challenges are ahead to exploit the full capabilities that Cloud computing undertakes. Cloud systems are less expensive to operate, consume less energy, and have higher utilization rates than traditional datacenters, which lead to the belief that much of the work done in traditional datacenters today will be pushed to the cloud by the end of the decade 1.2 Definition The National Institute of Standards and Technology (NIST) [7] has defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources, e.g. networks, servers, storage, applications, and services, that can be rapidly provisioned and released with minimal management effort or service provider interaction. In contrast to the conventional computing model, where end-user data and computing power are located in the user computer systems, Cloud computing resources are provided in massive, Virtualized infrastructures managed by professional service providers [6]. 1.3 Service Models Cloud Computing Architecture offers following Service Models. A. Infrastructure as a Service (IaaS)-Cloud clients directly use IT infrastructures which may include computing, storage, network elements, and other essential computing resources available in the IaaS cloud. Virtualization plays a vital role in IaaS cloud in order to assimilate or divide physical resources to meet rapidly changing resource demand from Cloud consumers [2]. Virtualization creates independent Virtual Machines (VM) that are separated from both the underlying hardware and other VMs. IaaS allows clients to deploy, run and have limited control over software like applications and Operating Systems. The service of Virtualized storage on demand is sometimes considered as a special type of IaaS and otherwise as separate Data Storage as a Service (DaaS) [2]. Amazon offers this service in the form of ECC cloud, S3 cloud [32]. B. Platform as a Service (PaaS)-PaaS offers complete software development platform facilitating cloud clients to develop cloud services and applications directly on the PaaS cloud. Infact Cloud PaaS is the use of tools and resources running on a cloud infrastructure to provide services to end-users. Clients can develop applications on top of the tools provided. Clients do not have control over the underlying infrastructure or operating systems, but on deployment of individual applications. Microsoft Windows Azure and Google App Engine are examples of PaaS providers[3,32]. C. Software as a Service (SaaS)-Cloud SaaS is the use of applications running on a cloud infrastructure to provide services to end-users. SaaS can deliver business applications such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), and Accounting etc. Examples of cloud SaaS are Google Apps [3,32] and Salesforce CRM. The difference between SaaS and PaaS is that SaaS only hosts developed cloud applications whereas PaaS offers a development platform that clients may use in order to develop their applications. This requires PaaS, in addition to supporting application hosting environment, to possess a complete development platform including programming environment, tools, and configuration management [32]. 1.4 Deployment Models Currently four Cloud deployment models are prevalent. A. Private Cloud-The Cloud infrastructure is operated exclusively within a single organization, and managed by the organization or a third party. It may be positioned within boundary of organization or outside [2, 32]. Objectives to setup a private cloud within an organization may be to optimize the utilization of available in-house resources, need for secure data access and trust, full control over sensitive and secret activities, fulfill need of academicians to build Private Cloud for research activities. B. Community Cloud-Several organizations working on some mission jointly deploy and share the same Cloud infrastructure as well as policies, decisions and values. The cloud infrastructure could be hosted by an either third-party vendor or one of the organizations in the community can take responsibility of hosting Cloud infrastructure [3, 32]. C. Public Cloud-This is the most pervasive structure of Cloud computing deployment model. The Public Cloud is used by the general public Cloud consumers. Here custody of policy framing rights and responsibility issues lies more with service providers rather than consumers [6]. Cloud service provider has full ownership of the Public Cloud with its own policy, value, profit, costing, and charging model. Examples of popular Public Cloud services are Amazon EC2, S3, Google AppEngine, and Force.com [32].
Cloud computing has taken the world in its strides. In cloud datacentres, thousands of physical m... more Cloud computing has taken the world in its strides. In cloud datacentres, thousands of physical machines run continuously to execute incoming workload. Virtual machines are provisioned to incoming requests and are allocated to physical machines. Efficient mapping of virtual machines to physical machines has potential impact on the efficiency of datacentres. This paper proposes two greedy heuristics for virtual machines to physical machines mapping. We have empirically evaluated proposed heuristics and existing greedy heuristics for comprehensive datasets including PlanetLab datasets. Thereafter we have considered issue of hotspot, and proposed two heuristics for hotspot mitigation. We have evaluated our proposed hotspot mitigation heuristics for wide varieties of cases and case of SLA violation is also taken into consideration. Extensive simulation shows that our proposed heuristics are substantially faster than their counterparts. As clouds have strong business perspective also, ou...
Sharing of information and resources among different devices require networking. As networks are ... more Sharing of information and resources among different devices require networking. As networks are expanding day by day, Internet Protocols are gaining more and more popularity. Different transition mechanisms have been established and yet a lot of research is to be carried out. Internet Protocol version 6 (IPv6) is the next generation Internet Protocol proposed by the Internet Engineering Task Force (IETF) to supersede the current Internet Protocol version 4 (IPv4). To enable the integration of IPv6 into current networks, several transition mechanisms have been proposed by the IETF IPng Transition Working Group. This work examines and empirically evaluates two transition mechanisms, namely 6-over-4, and IPv6 in IPv4 tunneling, as they relate to the performance of IPv6.This paper outlines many of the common known threats against IPv4 and then compares and contrasts how these threats, or similar ones, might affect an IPv6 network. Some new threats specific to IPv6 are also considered. The current capabilities of available products are evaluated, as is how any inherent protocol characteristics of IPv6 affect the nature of the threat. This is prefaced by a brief overview of current best practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.
International Journal of Business Information Systems, 2016
2013 Sixth International Conference on Contemporary Computing (IC3), 2013
2013 Sixth International Conference on Contemporary Computing (IC3), 2013