Towards Scalable Traffic Management in Cloud Data Centers

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
MEASUROUTING: A FRAMEWORK FOR ROUTING ASSISTED TRAFFIC MONITORING PRESENTED BY.
Green Cloud Computing Hadi Salimi Distributed Systems Lab, School of Computer Engineering, Iran University of Science and Technology,
Abstract Shortest distance query is a fundamental operation in large-scale networks. Many existing methods in the literature take a landmark embedding.
CloudMoV: Cloud-based Mobile Social TV
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
Abstract Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement.
Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-Based Wireless Networks.
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks.
Personalized QoS-Aware Web Service Recommendation and Visualization.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
Layered Approach using Conditional Random Fields For Intrusion Detection.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.
Network Aware Resource Allocation in Distributed Clouds.
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform.
Improving Network I/O Virtualization for Cloud Computing.
m-Privacy for Collaborative Data Publishing
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Optimal Client-Server Assignment for Internet Distributed Systems.
Protecting Sensitive Labels in Social Network Data Anonymization.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis.
Privacy Preserving Delegated Access Control in Public Clouds.
Keyword Query Routing.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
Automated Bandwidth Allocation Problems in Data Centers Yifei Yuan, Anduo Wang, Rajeev Alur, Boon Thau Loo University of Pennsylvania.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Preventing Private Information Inference Attacks on Social Networks.
Scalable Keyword Search on Large RDF Data. Abstract Keyword search is a useful tool for exploring large RDF datasets. Existing techniques either rely.
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
m-Privacy for Collaborative Data Publishing
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
A New Algorithm for Inferring User Search Goals with Feedback Sessions.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption.
Privacy-Preserving and Content-Protecting Location Based Queries.
Energy-Efficient Protocol for Cooperative Networks.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Load Rebalancing for Distributed File Systems in Clouds.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
BLOOD BANK MANAGEMENT SYSTEM I.MOHAMMED IRFAHN ( ) A.ARUN CHARLES ( ) S.JAYA PRAKASH ( ) S.KARTHIK( ) M. ARAVINDA DE SILVA.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Intrusion Detection-An Energy Efficient Approach In Heterogeneous WSN Department Of Computer Science and Engineering ADARSH COLLEGE OF ENGINEERING CHEBROLU.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
Spatial Approximate String Search. Abstract This work deals with the approximate string search in large spatial databases. Specifically, we investigate.
BY S.S.SUDHEER VARMA (13NT1D5816)
Md Baitul Al Sadi, Isaac J. Cushman, Lei Chen, Rami J. Haddad
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Installing Windows Server 2008
Virtual laboratories in cloud infrastructure of educational institutions Evgeniy Pluzhnik, Evgeniy Nikulchev, Moscow Technological Institute
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
ROBUST FACE NAME GRAPH MATCHING FOR MOVIE CHARACTER IDENTIFICATION
STEGANOGRAPHY.
Department Of Computer Science Engineering
Cloud Computing By P.Mahesh
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Presentation transcript:

Towards Scalable Traffic Management in Cloud Data Centers

Abstract Cloud Computing is becoming a mainstream paradigm, as organizations, large and small, begin to harness its benefits. This novel technology brings new challenges, mostly in the protocols that govern its underlying infrastructure. Traffic engineering in cloud data centers is one of these challenges that has attracted attention from the research community, particularly since the legacy protocols employed in data centers offer limited and unscalable traffic management.

Many advocated for the use of VLANs as a way to provide scalable traffic management, however, finding the optimal traffic split between VLANs is the well known NP-Complete VLAN assignment problem. The size of the search space of the VLAN assignment problem is huge, even for small size networks. This paper introduce a novel decomposition approach to solve the VLAN mapping problem in cloud data centers through column generation. Column generation is an effective technique that is proven to reach optimality by exploring only a small subset of the search space.

We introduce both an exact and a semi-heuristic decomposition with the objective to achieve load balancing by minimizing the maximum link load in the network. Our numerical results have shown that our approach explores less than 1% of the available search space, with an optimality gap of at most 4%. We have also compared and assessed the performance of our decomposition model and state of the art protocols in traffic engineering. This comparative analysis proves that our model attains encouraging gain over its peers.

Existing System Many advocated for the use of VLANs as a way to provide scalable traffic management, however, finding the optimal traffic split between VLANs is the well known NP-Complete VLAN assignment problem. The size of the search space of the VLAN assignment problem is huge, even for small size networks. The authors of used Markov Approximation techniques to solve the mapping problem and designed approximation algorithms with close to optimal performance guarantees.

Proposed System SPAIN proposed a greedy heuristic for packing flows or paths into a minimal set of VLANs and the subgraphs containing these VLANs are dynamically constructed. The authors proposed a virtual network abstraction which captures a tradeoff between application performance and provider costs. The problem reduces to a problem of resource allocation of VMs into physical servers where the network manager needs to ensure that bandwidth demands can be satisfied while maximizing the number of concurrent tenants.

Hardware Requirements System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. RAM : 256 Mb.

Software Requirements Operating system : - Windows XP Professional. Front End : - JSP Database : - SQL SERVER 2005