A Methodology on SCHEDULING IN CLOUD COMPUTING AND ITS TECHNIQUES
Journal: INTERNATIONAL JOURNAL OF DATA & NETWORK SECURITY (Vol.3, No. 1)Publication Date: 2013-06-15
Authors : Sanjeev Dhiman; Harwant Singh;
Page : 55-61
Keywords : : Cloud computing; Data centers; Virtualization; SOA; Service models; Virtualization; Grid Computing;
Abstract
The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. When this cloud is made available for the general customer on pay per use basis, then it is called public cloud. When customer develops their own applications and run their own internal infrastructure then is called private cloud. Integration and consolidation of public and private cloud is called hybrid cloud. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. These issues are arises during the deployment of mostly public cloud because in public cloud infrastructure customer is not aware where the data store & how over the internet.Cloud Computing has all the attributes and potential to support a global BPO environment. These attribute are: virtualization, service oriented architecture (SOA), utility based pricing and grid computing. Cloud Computing involves the movement of IT services ? application, infrastructure and platform ? onto the Internet and deployment models. Because of the high availability, high bandwidth and the increased use of the Internet it has become easier to access a variety of services, traditionally originating from within a company?s data center.
Other Latest Articles
- A RESEARCH AGENDA ON ARTIFICIAL NEURAL NETWORK TOPOLOGIES & DATA MINING IN NEURAL NETWORK
- A Methodology on cryptography and Stegnography Applicant to Mobile Adhoc Network & Wireless Sensor Network
- The yield of spring barley depending on fertilizers and retardant protection on typical chernozem
- The analysis of symmetric cryptographic algorithms of data from the point of view of a possibility of their polymorphic implementation
- Next Generation Firewall in Modern Network Security
Last modified: 2016-07-02 18:02:25