Role of Different Integer Virtual Machine in Cloud Data Center

Arif Ullah - Universiti Tun Hussein Onn Malaysia, Malaysia
Nazri Nawi - Universiti Tun Hussein Onn Malaysia, Malaysia
Hairulnizam Mahdin - Universiti Tun Hussein Onn Malaysia, Malaysia
Samad Baseer - University of Enginetnering and Technology, UET Peshawar, Pakistan
Mustafa Deris - Universiti Tun Hussein Onn Malaysia, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.3.4.274

Abstract


In modern data centres of cloud computing contains virtualization system. In order to improve network stability, energy efficiency, and makespan proper virtualization need. The virtual machine is one of the examples of virtualizations. Cloud computing data centres consist of millions of virtual machine to manage load balancing. In this study check the different number of virtual machine role in data centres, for that purpose, we established a network with the help of cloudsim and compare different data centres at each zones taking a different number of the virtual machine with different paramater and network banwith.After the simulation the result shows that increasning in the number of VM can affect the netwok accuracy in term of energy ,processing time ,coast and network stabality . 


Keywords


virtual machine; virtualization; cloud computing.

Full Text:

PDF

References


Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing—The business perspective. Decision support systems, 51(1), 176-189.

Ullah, A., Nawi, N. M., Shahzad, A., Khan, S. N., & Aamir, M. (2017). An E-learning System in Malaysia based on Green Computing and Energy Level. JOIV: International Journal on Informatics Visualization, 1(4-2), 184-187.

Umar, S., & Baseer, S. (2016, August). Perception of cloud computing in universities of Peshawar, Pakistan. In 2016 Sixth International Conference on Innovative Computing Technology (INTECH) (pp. 87-91). IEEE.

Mushtaq, M. F., Akram, U., Khan, I., Khan, S. N., Shahzad, A., & Ullah, A. (2017). Cloud computing environment and security challenges: A review. International Journal of Advanced Computer Science and Applications, 8(10), 183-195.

Gholami, A. (2016). Security and privacy of sensitive data in cloud computing (Doctoral dissertation, KTH Royal Institute of Technology).

Khanna, G., Beaty, K., Kar, G., & Kochut, A. (2006, April). Application performance management in virtualized server environments. In Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP (pp. 373-381). IEEE.

Rimal, B. P., Choi, E., & Lumb, I. (2009, August). A taxonomy and survey of cloud computing systems. In INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on (pp. 44-51). Ieee.

Rimal, B. P., Choi, E., & Lumb, I. (2009, August). A taxonomy and survey of cloud computing systems. In INC, IMS and IDC, 2009. NCM'09. Fifth International Joint Conference on (pp. 44-51). Ieee.

Nguyen, T., Raymond, R. M., & Leonhardt, M. L. (2003). U.S. Patent No. 6,658,526. Washington, DC: U.S. Patent and Trademark Office.

Hirschfeld, R. A., & McCrory, D. D. (2005). U.S. Patent No. 6,880,002. Washington, DC: U.S. Patent and Trademark Office.

Pabari, V. (2014). U.S. Patent No. 8,799,431. Washington, DC: U.S. Patent and Trademark Office.

Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A study of infrastructure as a service (IAAS). International Journal of engineering and information Technology, 2(1), 60-63.

Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., ... & Warfield, A. (2003, October). Xen and the art of virtualization. In ACM SIGOPS operating systems review (Vol. 37, No. 5, pp. 164-177). ACM.

Garfinkel, T., & Rosenblum, M. (2003, February). A Virtual Machine Introspection Based Architecture for Intrusion Detection. In Ndss (Vol. 3, No. 2003, pp. 191-206).

Goldberg, R. P. (1974). Survey of virtual machine research. Computer, (6), 34-45.

Heiser, G. (2008, April). The role of virtualization in embedded systems. In Proceedings of the 1st workshop on Isolation and integration in embedded systems (pp. 11-16). ACM.

Ning, H., Liu, H., Ma, J., Yang, L. T., & Huang, R. (2016). Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology. Future generation computer systems, 56, 504-522.

Cully, B., Lefebvre, G., Meyer, D., Feeley, M., Hutchinson, N., & Warfield, A. (2008, April). Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (pp. 161-174).

Tanenbaum, A. S. (2009). Modern operating system. Pearson Education, Inc.

Chakraborty, P., & Traut, E. P. (2013). U.S. Patent No. 8,370,819. Washington, DC: U.S. Patent and Trademark Office.