Performance Optimization of network using load balancer Techniques

Load Balancer helps in increasing the speed of transmission of data across the web. It increases the performance of the network by reducing network traffic and increasing the responsiveness of the application. Two devices can connect and communicate data to one another thanks to a set of standardized rules. Participants on the internet or their service providers are assigned IP addresses by address registries. In certain conditions the protocol performs better by managing the throughput and connectivity.Cloud computing is a pioneer among the rising technologies in the IT world today. Even though cloud computing has been around for a few years, the globe has yet to reap the full benefits of this technology. Among the many revolutionary effects envisaged as a result of theThere have been few successes with cloud computing technology, and the rest of the goals are currently being worked on.research. Cloud Security and Performance are two of the most significant barriers to cloud computing adoption.stability. One of the variables that has an impact on cloud performance stability is load balancing.computing.

Author(s):  
Dhimas Dirgantara ◽  
Is Mardianto

In this era, traditional technologies such as having servers and various kinds of hardware have been abandoned by large companies, which are turning to cloud computing technology. This technology makes it easier for companies to run their business. Of the many cloud computing service providers, Amazon Web Service (AWS) is one of the first and biggest service providers. Problems that occur in the use of cloud computing technology is the provision of access rights in data management. AWS has a service to manage access control for each service, namely Identity and Access Management (IAM). This service seeks to prevent activities that lead to security breaches. The results obtained are in the form of groups that can access AWS services according to the role given. Pada era ini, teknologi tradisional seperti memiliki server dan berbagai macam hardware telah ditinggalkan oleh perusahaan besar, yang beralih pada teknologi cloud computing. Teknologi ini memudahkan perusahaan dalam menjalankan bisnisnya. Dari banyaknya penyedia layanan cloud computing, Amazon Web Service (AWS) adalah salah satu penyedia layanan pertama dan yang terbesar. Masalah-masalah yang terjadi dalam penggunaan teknologi cloud computing adalah pemberian hak akses dalam melakukan manajemen data. AWS memiliki suatu layanan untuk mengatur kendali akses pada setiap layanan yaitu Identity and Access Management (IAM). Layanan ini berupaya mencegah aktivitas yang mengarah pada pelanggaran keamanan. Hasil yang didapatkan berupa group yang dapat mengakses layanan AWS sesuai dengan role yang diberikan.


Author(s):  
Neha Kewate

Abstract: Cloud computing is something simple we can define as maintaining data centers and data servers and also u can access technology services by computing power, storage, and database using cloud computing technology AWS(Amazon Web Services). It is an emerged model which is already popular among almost all enterprises. It provides us the concept of ondemand services where we are using and scaling cloud resources on demand and as per demand respectively. AWS Cloud computing is a cost-effective model. The major concern in this model is Security and Storage in the cloud. This is one of the major reasons many enterprises of choosing AWS cloud computing. This paper provides a review of security research in the field of cloud security and storage services of the AWS cloud platform. After security and storage, we have presented the working of AWS (Amazon Web Service) cloud computing. AWS is the most trusted provider of cloud computing which not only provides excellent cloud security but also provides excellent cloud storage services. The main aim of this paper is to make cloud computing storage and security a core operation and not an add-on operation. As per the increase in the Service provider and related companies, this AWS Cloud Platform plays a vital role in service industries by giving its best web services, so, therefore, choosing the cloud service providers wisely is the basic need of the industry. Therefore we are going to see how AWS fulfills all these specific needs. Keywords: Trusted Computing, AWS, Information-Centric Security, Cloud Storage, S3, EC2, Cloud Computing


Designs ◽  
2021 ◽  
Vol 5 (3) ◽  
pp. 42
Author(s):  
Eric Lazarski ◽  
Mahmood Al-Khassaweneh ◽  
Cynthia Howard

In recent years, disinformation and “fake news” have been spreading throughout the internet at rates never seen before. This has created the need for fact-checking organizations, groups that seek out claims and comment on their veracity, to spawn worldwide to stem the tide of misinformation. However, even with the many human-powered fact-checking organizations that are currently in operation, disinformation continues to run rampant throughout the Web, and the existing organizations are unable to keep up. This paper discusses in detail recent advances in computer science to use natural language processing to automate fact checking. It follows the entire process of automated fact checking using natural language processing, from detecting claims to fact checking to outputting results. In summary, automated fact checking works well in some cases, though generalized fact checking still needs improvement prior to widespread use.


2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Zhao Wu ◽  
Naixue Xiong ◽  
Yannong Huang ◽  
Qiong Gu ◽  
Chunyang Hu ◽  
...  

At present the cloud computing is one of the newest trends of distributed computation, which is propelling another important revolution of software industry. The cloud services composition is one of the key techniques in software development. The optimization for reliability and performance of cloud services composition application, which is a typical stochastic optimization problem, is confronted with severe challenges due to its randomness and long transaction, as well as the characteristics of the cloud computing resources such as openness and dynamic. The traditional reliability and performance optimization techniques, for example, Markov model and state space analysis and so forth, have some defects such as being too time consuming and easy to cause state space explosion and unsatisfied the assumptions of component execution independence. To overcome these defects, we propose a fast optimization method for reliability and performance of cloud services composition application based on universal generating function and genetic algorithm in this paper. At first, a reliability and performance model for cloud service composition application based on the multiple state system theory is presented. Then the reliability and performance definition based on universal generating function is proposed. Based on this, a fast reliability and performance optimization algorithm is presented. In the end, the illustrative examples are given.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2018 ◽  
Vol 7 (4.7) ◽  
pp. 131
Author(s):  
NV Abhinav Chand ◽  
A Hemanth Kumar ◽  
Surya Teja Marella

Emerging cloud computing technology is a big step in virtual computing. Cloud computing provides services to clients through the internet. Cloud computing enables easy access to resources distributed all over the world. Increase in the number of the population has further increased the challenge. The main challenge of cloud computing technology is to achieve efficient load balancing. Load balancing is a process of assigning load to available resources in such a way that it avoids overloading of resources. If load balancing is performed efficiently, it improves QoS metric including cost, throughput, response time, resource utilization and performance. Efficient load balancing techniques also provide better user satisfaction. Various load balancing algorithms are used in different scenarios for ensuring the same. In the current research, we will study different algorithms for load balancing and benefits and limitations caused to the system due to the algorithms. In this paper, we will compare static and dynamic load balancing algorithms for various measures of efficiency. These will be useful for future research in the concerned field. 


Author(s):  
Satish C. Sharma ◽  
Harshila Bagoria

Cloud computing is a new breed of service offered over the Internet, which has completely changed the way one can use the power of computers irrespective of geographic location. It has brought in new avenues for organizations and businesses to offer services using hardware or software or platform of third party sources, thus saving on cost and maintenance. It can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impact. Cloud computing has become a major topic of discussion and debate for any business or organization which relies on technology. Anyone connected to the Internet is probably using some type of cloud computing on a regular basis. Whether they are using Google’s Gmail, organizing photos on Flickr, or searching the Web with Bing, they are engaged in cloud computing. In this chapter, an attempt has been made to give an overview of this technology, its connection with libraries, the models in which libraries can deploy this technology for providing services and augment the productivity of library staff and case studies.


2016 ◽  
pp. 1157-1172
Author(s):  
Jonathan Bishop ◽  
Lisa Mannay

Wales is the “land of the poets so soothing to me,” according to its national anthem. The political and economic landscape does not on the whole provide for the many creative people that are in Welsh communities. Social media Websites like MySpace and YouTube as well as Websites like MTV.com, eJay, and PeopleSound, whilst providing space for artists to share their works, but do not usually consider the needs of local markets, such as in relation to Welsh language provision through to acknowledgement of Welsh place names and Wales's status as a country. The chapter finds that there are distinct issues in relation to presenting information via the Web- or Tablet-based devises and suggests some of the considerations needed when designing multi-platform environments.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2013 ◽  
Vol 3 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Veena Goswami ◽  
Choudhury Nishkanta Sahoo

Cloud computing has emerged as a new paradigm for accessing distributed computing resources such as infrastructure, hardware platform, and software applications on-demand over the internet as services. This paper presents an optimal resource management framework for multi-cloud computing environment. The authors model the behavior and performance of applications to integrate different service-providers for end-to-end-requirements. Each service model caters to specific type of requirements and there are already number of players with own customized products/services offered. Intercloud Federation and Service delegation models are part of Multi-Cloud environment where the broader target is to achieve infinite pool of resources. They propose an analytical queueing network model to improve the efficiency of the system. Numerical results indicate that the proposed provisioning technique detects changes in arrival pattern, resource demands that occur over time and allocates multiple virtualized IT resources accordingly to achieve application Quality of Service targets.


Sign in / Sign up

Export Citation Format

Share Document