Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

A Study on Resource Pooling, Allocation and Virtualization Tools used for Cloud Computing

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Aaqib Rashid, Amit Chaturvedi
10.5120/ijca2017914290

Aaqib Rashid and Amit Chaturvedi. A Study on Resource Pooling, Allocation and Virtualization Tools used for Cloud Computing. International Journal of Computer Applications 168(2):7-11, June 2017. BibTeX

@article{10.5120/ijca2017914290,
	author = {Aaqib Rashid and Amit Chaturvedi},
	title = {A Study on Resource Pooling, Allocation and Virtualization Tools used for Cloud Computing},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {168},
	number = {2},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {7-11},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume168/number2/27845-2017914290},
	doi = {10.5120/ijca2017914290},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In cloud computing various types of resources like CPU, Memory, OS, Application Software etc. are used. A cloud server, which has sufficient resources all the time for its clients as resource pools, efficiently and dynamically allocates or deallocates these resources, is considered good for its clients.

Here, in this paper, we have presented a study on various types of resource pools like physical server pools, virtual server pools, storage pools, network pools etc available in cloud computing, various allocation strategies, and virtualization tools used in cloud computing to manages these resources for client’s request. This study will be useful to understand the underlying technologies of cloud computing.

References

  1. A. J. Younge, R. Henschel, J.T. Brown, G. V. Laszewski, J Qiu, G. C. Fos, “Analysis of Virtualization Technologies for High Performance Computing Environments”, pp.1-8, Pervasive Technology Institute, Indiana University.
  2. Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012, pp. 39-45.
  3. Sudha M, Harish G M, Nandan A, Usha J, “PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 1, February 2013, pp.137-144.
  4. Durairaj. M, Kannan.P, “A Study On Virtualization Techniques And Challenges In Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 11, NOVEMBER 2014, ISSN 2277-8616, pp 147-151.
  5. Ms Jayshri Damodar Pagare, Dr. Nitin A Koli, “A technical review on comparison of Xen and KVM hypervisors: An analysis of virtualization technologies”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 12, December 2014, ISSN (Online) : 2278-1021, ISSN (Print) : 2319-5940, pp. 8828-8832.
  6. V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao, “Analysis on Virtualization Technologies in Cloud”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol 3 Issue 7, July 2014, ISSN: 2278 – 1323, pp 2567-2574.
  7. G. Cephas Obasuyi, Arif Sari, “Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment”, Int. J. Communications, Network and System Sciences, 2015, vol. 8, pp. 260-273
  8. V. A. Meshram, V. V. Meshram, P. V. Khandare, , Dr. S. R. Sakhare, “Cloud Computing and Virtualization Security: A Survey”, International Journal of Computer Trends and Technology (IJCTT) – volume 12 number 4 – Jun 2014
  9. Kanika, Navjot Sidhu, “Analysis of Virtualization: Vulnerabilities and Attacks over the Virtualized Cloud Computing”, International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), ISSN (Print): 2279-0047, ISSN (Online): 2279-0055, pp.391-396.
  10. Diego Perez-Botero, Jakub Szefer and Ruby B. Lee, "Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers," in Proceedings of the Workshop on Security in Cloud Computing (SCC), May 2013.
  11. Swati Pawar, Sarvesh Singh, “Performance Comparison of VMware and Xen Hypervisor on Guest OS”, International Journal of Innovative Computer Science & Engineering, Vol 2 Issue 3; July-August-2015; Page No. 56-60, ISSN: 2393-8528.
  12. Rémi Cura, Julien Perret, Nicolas Paparoditis, “A scalable and multi-purpose point cloud server (PCS) for easier and faster point cloud data management and processing”, ISPRS Journal of Photogrammetry and Remote Sensing, 2016, http://dx.doi.org/10.1016/ j.isprsjprs.2016.06.012
  13. Lizzie Coles-Kemp, Joseph Reddington, Patricia A.H. Williams, “Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud”, Information Security Technical Report 16 , 2011, pp115-122.
  14. Saraswathi AT, Kalaashri.Y.RA, Dr.S.Padmavathi, “Dynamic Resource Allocation Scheme in Cloud Computing”, Procedia Computer Science 47 ( 2015 ), pp 30 – 36.
  15. Narander Kumara, Swati Saxenab, “A Preference-based Resource Allocation In Cloud Computing Systems”, 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015), Procedia Computer Science 57 ( 2015 ), pp 104 – 111.

Keywords

Resource pooling, cloud computing, virtualization, hypervisor, virtual machine, allocation, deallocation.