Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distributed environments. As Cloud Computing is growing rapidly and clients are demanding more services and better results, shipment equilibrium for the Cloud has become a very interesting and important research area. Many algorithms were suggested for assigning the client's requests to avail Cloud nodes. However, in a cloud computing environment, failure is the norm, and nodes may be upgraded, replaced, and added in the system. Files can also be dynamically created, deleted, and appended. This results in load imbalance, that is, the file chunks are not distributed as uniformly as possible in the nodes.
Authors and Affiliations
V Saibhanu, P Bhargava
A Novel Approach for Finding Optimal Overlay Nodes In Routing
In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...
Smart Antennas Adaptive Beamforming through Statistical Signal Processing Techniques
The smart antenna improves the performance of wireless communication systems by increasing channel capacity and spectrum efficiency, extending range of coverage, steering multiple beams to track several mobiles. Smar...
A Distributed Algorithm for identifying failures in WSN
A wireless sensor network is a technology for monitoring physical or environmental conditions such as temperature, pressure, sound etc. A WSN can get separated into multiple connected sensors. But some nodes may fail...
Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and emin...
Transmission Power Control in Wireless ad hoc Networks
In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...