PPDIOO System Design - Literature Review - Edited
PPDIOO System Design - Literature Review - Edited
TORING OF
TECHNOLOG
Y
TRANSFER
PROJECTS
IN
INDUSTRIAL
CLUSTERS
EFFECTIVE INFORMATION SECURITY
MONITORING OVER IoT CLOUD
CONNECTED TECHNOLOGY AND
NETWORKS
Abstract: Over the years, the rise in connectivity between devices connected with sensors and
applications to transmit and collect information over network channels has been supported with
the advancement of technology infrastructure. IoT connected devices support real time exchange
of data over networked connections. Information security threats are present with new
technology advancements and need to be countered to ensure information security is maintained
over edge or fog cloud network. A PPDIOO system design and development approach is
outlined in this study to ensure real time information security monitoring or anomalous traffic
and incident detection over network communication supporting data transmission in an IoT
cloud connected network.
Contents
List of Figures............................................................................................................................................3
Project Information...................................................................................................................................4
Chapter 1: Introduction & Background..................................................................................................5
Chapter 2: Scope and Objective...............................................................................................................7
Aims and Objectives..............................................................................................................................8
Chapter 3: Literature Review.................................................................................................................10
Chapter 4: Project Plan..........................................................................................................................12
Chapter 5: Methodology.........................................................................................................................13
5.1: Prepare..........................................................................................................................................13
5.2: Plan................................................................................................................................................13
5.3: Design............................................................................................................................................14
5.4: Implement.....................................................................................................................................15
5.5: Operate..........................................................................................................................................16
5.6: Optimize........................................................................................................................................18
Chapter 6: Iterations...............................................................................................................................21
Iteration 1:Receiving events into the cloud network.........................................................................21
Iteration 2: Virtualization of the cloud data center to trigger authorized workload......................22
Reviewing Functional requirements...................................................................................................23
Chapter 7: Project Budget......................................................................................................................24
Skilled labor and human resource......................................................................................................24
Hardware Equipment & Resources...................................................................................................24
Software Resources..............................................................................................................................24
Chapter 8: Project Risk Analysis...........................................................................................................26
Limitation of the Project.....................................................................................................................27
Chapter 9: Communication Plan............................................................................................................28
Chapter 10: Stakeholder Identification.................................................................................................29
Conclusion................................................................................................................................................30
References................................................................................................................................................31
Appendix..................................................................................................................................................32
Virtualization cloud simulation IoT task scheduling algorithm.......................................................32
Cloudsim simulation Output from the Algorithm.............................................................................37
List of Figures
Figure 1 :Information security issues affecting IoT Cloud networks..............................................8
Figure 2:Logical framework design of the proposed IoT network function ability......................14
Figure 3: A simulated design of an edge cloud network device nodes and data center................15
Figure 4: created Virtualization machines in data centers............................................................16
Figure 5: Successfully sent cloudlets to Virtualized data center logs...........................................16
Figure 6: Cloudsim simulation for cloudlet transmission..............................................................18
Figure 7: failed allocation instance to host data center logs..........................................................19
Figure 8.Successful simulation output...........................................................................................20
Figure 9: iteration 1.......................................................................................................................21
Figure 10:iteration 2......................................................................................................................22
Project Information
Project Details
Project Title
Project Type
Project Code
Project Location
Project Starting Date
Project Coordinator
Name
Phone number
Email
Name
Student ID
Phone Number
Email
Project Supervisor
Project Title
Project Type
Project Code
Project Location
Project Starting Date
The advancement in the technology to support IoT transmission over cloud networks brings
about the rise in new way to establish cyberattacks to allow unauthorized modification and
exploitation of data and devices supported by IoT cloud networks [ CITATION Ste18 \l 1033 ].
Organizations need to allocate extra funds in their annual budgets to facilitate costs to meet the
ever growing cyber security concerns in their business information systems.
Achieving information security is an important component of the data management function for
every organization [ CITATION Coo18 \l 1033 ]. Organizational stakeholders rely on 3rd party
organizations to carry out the information security function over their cloud network for a
subscription fee or implement information security incident detection and mitigation on their
own through hired cyber security expert staff.
The use of 3rd party organizations to secure information transmitted by client organization comes
with major setbacks to the client information especially if non - disclosure agreements are not
met by the service provider. Most organizations prefer to build their own cloud networks to
facilitate secure transmission of IoT data from the connected end device nodes and their data
centers.
Information safety and compliance regulatory bodies around the globe emphasize the need for
information security for connected cloud networks. The Telecommunication Industry
Association defines a data center as a building or part of a building designed to centralize
information resources for organizations and allow businesses to provide uninterrupted network
transmission services for information processing operations [ CITATION Tho18 \l 1033 ]. The
procedures for designing a data center should include aspects such as network access control and
security, the network architecture, file storage, retrieval, and backup, electrical power
consumption and management system redundancy, cloud hosting for web, application, and
databases.
General Data Protection Regulation and compliance provides a guideline to control how
companies handle consumer and user private data within their networks .This regulation applies
to organizations operating anywhere in the world and serves consumer individuals in the
European union. ISO/IEC 27001:2013 specifies the requirements for establishing,
implementation, maintenance, and improvement of information security management and
enhance system for IOT network deployment in organizations.
Organizations whose operations and system activities are deployed over cloud connected
networks are expected to meet some requirements in order to get ISO 27001 certification. These
include establishment of a risk management framework, conduct a risk assessment on the IoT
supporting cloud network, implementing system controls against risk, Staff training to help
counter detected risks, and establishing monitoring and review to help improve and update the
information security system.
Chapter 2: Scope and Objective
The scope of the project addressed existing needs from previous technologies such as traditional
and centralized computing. Present challenges affecting existing cloud data centers to effectively
support information security between end device nodes and data centers in an IoT network are
addressed in the study.
The project was initiated to optimize cybersecurity for transmitted real time events, data, and
devices connected to IoT networks at cost friendly prices. The project manager and developer
team concentrated on dynamic task allocation of received and transmitted information workload
from IoT connected device nodes and data center.
Workloads transmitted over IoT cloud supported environments and networks come with different
processing needs, functional requirements and complexities [ CITATION Che21 \l 1033 ]. Hardware
equipment to optimize their transmission over cloud computing environments is expected to
maintain high speed transmissions and is expensive to acquire and implement in small sized and
medium sized organization.
The objective of this research is to bring knowledge to light on task scheduling mechanisms
applied to cloud computing. From distributed processing, IoT cloud equipment vendors to
organizations see the need to improve server and other hardware resources performance through
task scheduling to achieve real time and effective communication of the connected devices and
workload transmission.
This research shows the evolution of task scheduling technology and models over time to support
cloud computing systems for most institutions and users to allocate processing time for
transmitted workloads. Task scheduling models are designed differently according to the way
they function in approach to information and workload to be processed over cloud connected
systems. Complex data sets require sophisticated task scheduling models to transmit efficiently
and may be hard to detect in the event they are intercepted with malicious traffic in a cloud
network.
Dynamic task scheduling algorithm that will be used to allocate tasks to different enterprises on a
Cloud manufacturing setup. The proposed scheduling algorithm would be intended to deal with
the time uncertainty of tasks arrival in a Cloud Manufacturing environment [ CITATION JHC20 \l
1033 ]. The research would compare the model’s performance against previous work
transmission approaches.
This study highlights advanced applications derived from task scheduling designed algorithms
and how they can be used to detect and mitigate cyber security incidents e.g. cloud computing
topology attacks like DDoS deployed over cloud computing connected devices and systems for
businesses and other organizations.
Figure 1 :Information security issues affecting IoT Cloud networks
The proposed project aims to achieve cloud network accountability for network topology
security. This is through facilitation of workload transmission for only system authenticated
devices and end sensor nodes with authorized connections over IoT cloud networks.
The proposed IoT cloud network design project aims at achieving network transmission
productivity for client organizations with existing or outdated network support technology. This
is achieved by dynamically processing and transmission of authorized cloudlets and tasks to
connected data center over minimal transmission time.
Chapter 3: Literature Review
Topology networks supporting information transmission and device communication on cloud
computing network infrastructure are need internet access to facilitate real time information
exchange [ CITATION Moh20 \l 1033 ]. Cyber threats exist over internet connections, and with new
technology advancement over time, the number of cyber threat inventions to affect information
security in cloud connected network rises.
Topology attacks on connected servers to cloud supported infrastructure systems, back end
infrastructure, and the overall network infrastructure are facilitated through code injections, cross
site scripting attacks by hackers to input many recurring requests and instructions to the target
systems database and server till it is overwhelmed to perform instructions as authorized
[ CITATION Tho18 \l 1033 ]. This is leads to distributed denial of service attacks on the target cloud
system to validate the authorization and the authenticity of requests and commands leading to
system transactions in the network.
Network and topology infrastructure is presented as a vulnerability that affects the integrity of
information systems. Network servers represent the core function and support of web application
for all organizations. A vulnerable server leads to a vulnerable user application system since the
database is stored on it and information transmitted through the network are passed through the
server. Servers are affected by topology attacks such as DDOS attacks that overwhelm it with
more instructions and commands than it can handle.
Overwhelmed switches and servers allow the attacker to perform unauthorized modifications on
a target cloud network system transmitted data as the queries supported by servers can’t function
to ensure the set system parameters are met before allowing a transaction to occur.
Received workload that does not the set parameters is not transmitted over the connected switch
and is logged as malicious or intercepted traffic for further analysis by cyber security experts or
system auditors [ CITATION Ste18 \l 1033 ]. This effects topology security in a connected cloud
network as distributed denial of service attack that overwhelm the function ability of cloud
topologies and infrastructure to ensure cloud network security are detected , mitigated and
reported before they occur.
Cloud computing has revolutionized real time information processing over centralized network
servers to facilitate distributed processing for cloud connected devices and systems [ CITATION
JHC20 \l 1033 ]. With distributed processing, dynamic task scheduling can be supported over
different virtualized data centers and servers in a connected cloud network.
Latency time information for workload received in a cloud network requesting processing time
and cloud virtualization resources is determined over the bridged switch connected to the data
center. The bridged switch relays received and authorized workload through hop counts to
neighboring switch nodes [ CITATION Tho18 \l 1033 ]. The switch is configured to only process and
allocated processing time to authorized received workload that meet the set cloud system
parameters to effect information security in the supported cloud network.
Chapter 5: Methodology
5.1: Prepare
Technological and standardization gaps exist in previous technologies and networks to
efficiently enhance information security for devices connected to centralize and traditional
implemented networks.
Organizations which deploy their data and workload over IoT supported cloud networks are
expected to abide by set technology privacy guidelines such as TIA, GDPR, and ISO 27001:13
for them to be approved to operate in most jurisdictions such as Europe, US, and other part of the
world [ CITATION Moh20 \l 1033 ]. Organizations need to comply by these politically set
regulations in order to get business permits to operate over their networks and also achieve
business agility from efficient business transactions e.g. online sales to clients.
For this project, stakeholders in an organization need an IoT supported network that supports real
time information transfer from connected devices to established data center to meet se guidelines
and also achieve real time online sustainable business operations.
To establish an IoT cloud network as per Telecommunication Infrastructure Standard for data
centers (TIA-942), the following need to be considered in the project.
1. A data center room that meets TIA-942 standards needs to be designed to incorporate a
raised floor.
2. An operation command center should be included in the data center to enable
organizational employees to monitor connected servers
3. Staging area for data configuration of devices connected to the data center
4. Electrical power supply to power the IoT network
The project developers are required to include systems that meet ISO 27001:2013 for
information security in order to ensure information integrity on the connected cloud network. A
Meraki switch is proposed to be included in the network to meet user cloud demands to connect
devices wireless and also through wired transmission.
5.2: Plan
Network audits on passive traffic analysis from previously transmitted workload from existing
networks and active traffic analysis generated by an application generating synthetic traffic from
voice, application and web traffic from workload transmitted in cloud network technology is
used by project developers to audit the plan and methodology of the proposed network. Existing
documentation from previous network transmission technologies is used to check if the designed
model can meet transmission requirement for the proposed network to meet IoT user support and
transmission requirements.
Once the proposed model is accepted, the developers plan how to approach the development of
the proposed design and actualize. Feasibility studies are conducted to ensure that the proposed
IoT cloud design will benefit the client organization to meet their computing and information
traffic needs.
Figure 2:Logical framework design of the proposed IoT network function ability
5.3: Design
Once the plan is approved, a logical illustration of the proposed IoT network model is developed.
Hardware equipment to support the cloud network technology, Software to support the
transmission is included, CPU memory utilization for the network, Virtual private cloud to split
tunnel sensitive information to transmitted in the network.
Figure 3: A simulated design of an edge cloud network device nodes and data center
The existing data center room is improved to meet regulation policies by TIA-942. From figure
3, once the data center room has been completed, two data centers are connected to cloud
connection to facilitate scalable support for information transmission between the connected.
Workload transmission from the data center to device end nodes is depicted by the green and red
colors in figure 3.
A firewall system is implemented between routers and end device sensor nodes to ensure only
authorized traffic reach to the data center. The network topology is supported by the switch
devices that transmit workloads across it. Applications from system connected device sensors
e.g. IoT smart door, humidity monitor, fire monitor, connected laptop are controlled remotely
from the data center.
5.4: Implement
Once the IoT cloud network has been established, from one of the connected PC, Cloud simulation for
java projects is implemented in the network to monitor how the network accepts and transmits received
workloads.
The project development team wishes to achieve real time dynamic task scheduling for all events
transmitted in the developed cloud network. Received tasks into the cloud network are assigned a unique
ID in regards to its characteristics. The switch in the cloud network is configured to only transmit events
that have a cloudlet ID to the network’s data center.
The broker accepts virtue machines that meet the set parameters to connect to the host data
centers. E.g. does not exceed the set ram limit. Figure 4 below shows created virtualization
machines initializing in the data center for cloud simulation.
0.1: Broker: VM #0 has been created in Datacenter #2, Host #0
0.1: Broker: VM #1 has been created in Datacenter #2, Host #0
0.1: Broker: VM #2 has been created in Datacenter #2, Host #0
0.1: Broker: VM #3 has been created in Datacenter #2, Host #1
0.1: Broker: VM #4 has been created in Datacenter #2, Host #0
0.1: Broker: VM #5 has been created in Datacenter #2, Host #1
Figure 4: created Virtualization machines in data centers
Successfully connected virtualization machine instances to the data centers allows the algorithm to
trigger the transmission of received cloudlets representing applications and system transactions over
the data centers for simulation. The same simulation facilitates virtualization for IoT supported networks
to dynamically effect data transmission and connected device sensors real-time communication
0.2: Broker: Sending cloudlet 0 to VM #0
0.2: Broker: Sending cloudlet 1 to VM #1
0.2: Broker: Sending cloudlet 2 to VM #2
0.2: Broker: Sending cloudlet 3 to VM #3
0.2: Broker: Sending cloudlet 4 to VM #4
0.2: Broker: Sending cloudlet 5 to VM #5
Figure 5: Successfully sent cloudlets to Virtualized data center logs
5.5: Operate
A pseudocode algorithm design is developed by researchers to depict how the cloud simulation will run
to allocate received tasks, allocate a cloudlet ID over received task, and set the allowed cloudlets over
the virtue machines created to process the tasks over data centers.
The model designed by researcher is set to effect quality of transmission of the set tasks.
Start
Receive Ttasks in to cloud network 0;
Ttasks ={0,1,2,3,5,8,10,23,34,16,12,40,….n}
Set Ttasks over Br to filter off tasks that don’t meet set LV;
LV (Ttasks) = {ram size, mipr, system parameters set}
If (Ttasks) is not null
LV (ts)} +1
Else exit LV
Endif
For Vm = {0, 1, 2, 3,…n }
Assign Ttasks to broker and virtue machines
Select C from assigned Ttasks
Process C over DH and DC
Select beginning of transmission time
Select transmission end time
Calculate transmission time
End for
While Ttasks remain unassigned
Print transmission not successful
end while
print c
print transmission time
end
For the above pseudocode;
Ttasks For cloud network labeled as 0
Brokers as Br
Received tasks as Ttasks
Virtue machines as VM
Data Center as DC
Data host as DH
Required parameters for transmission as LV
From the cloud simulation in figure 6 below, received cloudlets that meet the cloudsim
virtualization set requirements are attached with a cloudlet ID and allocated processing time for
transmission .The project development team can ensure that the cloud system only accepts
workload traffic that meets the set criteria into the IoT network. The received tasks whose
characteristics don’t meet the system set parameters are not transmitted and are logged as
unsuccessful workload transmission for further investigation by system administrators.
5.6: Optimize
The received data packets and information traffic is transmitted through link layer discovery protocol
within the switches. From figure 3, Switches are programmed to forward receive data packets to the
designated destination device through neighboring nodes. These neighboring switch nodes receive and
forward transmitted packets to their neighboring nodes till a packet is successfully sent. Communication
of these nodes is cut off if a packet is not successfully transmitted across
Hop counts are run within each node to establish the latency time to require transmit a successful
packet through a switch to the data cloud centers. A constant latency time is derived per workload sent
from the edge sensors to the supported devices in the network cloud.
A function is declared to derive latency transmission time per neighboring node in a switch, switch
transmission time, frequency of transmission per switch in the edge cloud network.
Let;
Switch Hop count Ht ; counts per neighboring switch nodes required to forward a
transmitted packet to a cloud
Latency time be Lt; time required to forward a forwarded packet to a neighboring node.
Lh represents the highest latency time recorded and Ll represents the lowest
Ht
−Mt ± √ Mt 2−4 H t f
P t=
2 Ht
From the declared latency time of transmission per node, the frequency of data transmission can
be derived by calculating the time required to forward a data packet to a neighboring node per
the time an edge connected data switch requires to forward and receive a deployed data packet.
This frequency can be monitored to ensure that the information transmitted within the edge
network is authenticated and that its source and recipient is authorized to have access to the data.
Virtualization allows system users to create virtue layers over connected hardware which
allowed system users to run multiple instances on connected hardware. The broker rejects some
virtue machines trying to connect to the host data center as they don’t meet some parameters e.g.
Virtue machine RAM memory need to trigger the received event is greater than the system
allocated RAM.
Simulation output results from successful transmission over the cloud data center are tabulated into
cloudsim output log.
Information security is only achieved once some steps are achieved through device configuration and
cloud data center virtualization.
The proposed cloud network is set to meet information safety requirements by ensuring
workload that need to transmitted to the data center falls within the set system parameters. The
system logs received workload whose properties exceed the set parameters e.g. ram size and
triggers the report to the authorized system and cloud network administrators . The cloud
network system only allocates transmission resources to received workload that meet the set
parameters
Iteration 2: Virtualization of the cloud data center to trigger authorized workload
Figure 10:iteration 2
Once authorized received workload is allocated virtualization resources, the cloud set broker
allocates the workload transmission time from the set latency transmission time. Transmission
time is counted for each workload transmitted over the switch and other connected devices
supporting the network. Transmitted workload whose latency transmission time exceeds the set
transmission time are logged as malicious or intercepted and system administrators follow up the
log report for malicious interception. The network shuts down the virtualization engine once
transmission ends.
Set parameters to filter out workloads that have more system requirements than the cloud
network can meet. This is through the set parameters initiated in the resource container .From the
code in the appendix, set parameter include;
The system should also calculate the transmission time for all cloudlets transmitted from the
connected devices and sensors to the cloud data center. This derived latency time is used to
ensure that the transmitted workload are not intercepted by any unauthorized malicious script as
this increases the cloud network transmission time.
Nonfunctional system requirements are attributes discovered from running the system by the
cloud users. Dynamic task allocation of cloudlets and authorized workload ensures high
performance of the network to randomly allocate virtualization resources in a cloud connected
network securely. This reduces cloud system downtime and transmission lags due to deadlock
situations in the cloud network.
Chapter 7: Project Budget
The development of this project could only be successful if the hardware equipment acquired to
support the technology network transmission matched the skilled workforce to implement the
network cloud system. The project development team proposed a budget to be incurred for the
project expenses in order to make it a success.
Software Resources
Software Type Quantity Cost
Chrome Browser Free to use software 6 0$
Windows 10 100 $ 6 600 $
Kali Linux system Free to use software 3 0$
administration
Windows server Free to use software 3 0$
VM Ware 300$ 2 600 $
Cloudsim virtualization Free to use software 1 0$
TOTAL 1200 $
The software can only counter topology attacks such as distributed denial of service attacks. The
system cannot independently detect malware from received workload and requires other 3rd party
software to fully protect the implemented network system from real-time information threats.
Chapter 9: Communication Plan
Communication between the project development team, client organization, and other
stakeholders who need the implementation of an IoT cloud network was necessary to track the
progress of the project development.
Stakeholders Communication Location Frequency
means
Client –Project Face To face meetings Project site After Completion of
manager each project
development phase.
Project manager & Face To face meetings Project site To address project
Project Team phase requirements
members before a new phase
begins
Targeted distributed attacks over IoT cloud networks overwhelm authentication security control
bounds if the magnitude of the attack is high. Distributed denial of service attacks affect
topologies that support IoT cloud transmission .This is system has been developed to support the
countermeasures of such topology attacks. Its implementation on an organization’s network
secures organization devices and information transmitted from topology attacks.
References
Aburukba, R. A. &. L., 2020. Scheduling Internet of Things requests to minimize latency in
hybrid Fog–Cloud computing.. Future Generation Computer Systems.
Almogren, M. &., 2020. Security Challenges and Strategies for the IoT in Cloud Computing. s.l.,
11th International Conference on Information and Communication Systems (ICICS).
Chen, F. L. D. P. F. &. T., 2021. IoT Cloud Security Review: A Case Study Approach Using
Emerging Consumer-oriented Applications. s.l., ACM Computing Surveys (CSUR).
Cook, A. R. M. F. M. &. M. L., 2018. Internet of cloud: Security and privacy issues. In Cloud
Computing for Optimization: Foundations, Applications, and Challenges.
J.H. & Chowdhury, 2020. An improved genetic algorithm using greedy strategy toward task
scheduling optimization in cloud environments. Neural Computing and Applications.
Onizawa, R. &. T., 2016. Next-generation IoT-based production system for high-mix low-
volume products in an era of globalization. Hitachi Review.
Stergiou, B. &. K., 2018. Secure integration of IoT and cloud computing. Future Generation
Computer Systems.
Thota, C. S. R. M. G. V. &. P., 2018. Centralized fog computing security platform for IoT and
cloud in healthcare system. In Fog computing: Breakthroughs in research and practice .
Xue, W. &. S., 2018. Knowledge based differential evolution for cloud computing service
composition. Journal of Ambient Intelligence and Humanized Computing.
Appendix
import java.text.DecimalFormat;
import java.util.ArrayList;
import java.util.Calendar;
import java.util.LinkedList;
import java.util.List;
import org.cloudbus.cloudsim.Cloudlet;
import org.cloudbus.cloudsim.CloudletSchedulerTimeShared;
import org.cloudbus.cloudsim.Datacenter;
import org.cloudbus.cloudsim.DatacenterBroker;
import org.cloudbus.cloudsim.DatacenterCharacteristics;
import org.cloudbus.cloudsim.Host;
import org.cloudbus.cloudsim.Log;
import org.cloudbus.cloudsim.Pe;
import org.cloudbus.cloudsim.Storage;
import org.cloudbus.cloudsim.UtilizationModel;
import org.cloudbus.cloudsim.UtilizationModelFull;
import org.cloudbus.cloudsim.Vm;
import org.cloudbus.cloudsim.VmAllocationPolicySimple;
import org.cloudbus.cloudsim.VmSchedulerTimeShared;
import org.cloudbus.cloudsim.core.CloudSim;
import org.cloudbus.cloudsim.provisioners.BwProvisionerSimple;
import org.cloudbus.cloudsim.provisioners.PeProvisionerSimple;
import org.cloudbus.cloudsim.provisioners.RamProvisionerSimple;
for(int i=0;i<vms;i++){
vm[i] = new Vm(i, userId, mips, pesNumber, ram, bw, size, vmm,
new CloudletSchedulerTimeShared());
list.add(vm[i]);
}
return list;
}
//cloudlet parameters
long length = 1000;
long fileSize = 300;
long outputSize = 300;
int pesNumber = 1;
UtilizationModel utilizationModel = new UtilizationModelFull();
for(int i=0;i<cloudlets;i++){
cloudlet[i] = new Cloudlet(i, length, pesNumber, fileSize,
outputSize, utilizationModel, utilizationModel, utilizationModel);
// setting owner of the set Cloudlets
cloudlet[i].setUserId(userId);
list.add(cloudlet[i]);
}
return list;
}
try {
// Initialize the CloudSim package for simulation.
int num_user = 1; // number of grid users
Calendar calendar = Calendar.getInstance();
boolean trace_flag = false; // mean trace events
// Create Datacenters
//Datacenters are the resource providers in CloudSim. We need at
list one of them to run a CloudSim simulation
@SuppressWarnings("unused")
Datacenter datacenter0 = createDatacenter("Datacenter_0");
@SuppressWarnings("unused")
Datacenter datacenter1 = createDatacenter("Datacenter_1");
//Fourth step: Create VMs and Cloudlets and send them to broker
vmlist = createVM(brokerId,20); //creating 20 vms
cloudletList = createCloudlet(brokerId,40); // creating 40
cloudlets
broker.submitVmList(vmlist);
broker.submitCloudletList(cloudletList);
CloudSim.stopSimulation();
printCloudletList(newList);
hostList.add(
new Host(
hostId,
new RamProvisionerSimple(ram),
new BwProvisionerSimple(bw),
storage,
peList1,
new VmSchedulerTimeShared(peList1)
)
);
hostId++;
hostList.add(
new Host(
hostId,
new RamProvisionerSimple(ram),
new BwProvisionerSimple(bw),
storage,
peList2,
new VmSchedulerTimeShared(peList2)
)
);
//Data center created Characteristics and properties for the set data center
DatacenterCharacteristics(
arch, os, vmm, hostList, time_zone, cost, costPerMem,
costPerStorage, costPerBw);
if (cloudlet.getCloudletStatus() == Cloudlet.SUCCESS){
Log.print("SUCCESS");
}
}
Cloudsim simulation Output from the Algorithm
Starting Cloud simulation for triggered events...
Initialising...
Starting CloudSim version 3.0
Datacenter_0 is starting...
Datacenter_1 is starting...
Broker is starting...
Entities started.
0.0: Broker: Cloud Resource List received with 2 resource(s)
0.0: Broker: Trying to Create VM #0 in Datacenter_0
0.0: Broker: Trying to Create VM #1 in Datacenter_0
0.0: Broker: Trying to Create VM #2 in Datacenter_0
0.0: Broker: Trying to Create VM #3 in Datacenter_0
0.0: Broker: Trying to Create VM #4 in Datacenter_0
0.0: Broker: Trying to Create VM #5 in Datacenter_0
0.0: Broker: Trying to Create VM #6 in Datacenter_0
0.0: Broker: Trying to Create VM #7 in Datacenter_0
0.0: Broker: Trying to Create VM #8 in Datacenter_0
0.0: Broker: Trying to Create VM #9 in Datacenter_0
0.0: Broker: Trying to Create VM #10 in Datacenter_0
0.0: Broker: Trying to Create VM #11 in Datacenter_0
0.0: Broker: Trying to Create VM #12 in Datacenter_0
0.0: Broker: Trying to Create VM #13 in Datacenter_0
0.0: Broker: Trying to Create VM #14 in Datacenter_0
0.0: Broker: Trying to Create VM #15 in Datacenter_0
0.0: Broker: Trying to Create VM #16 in Datacenter_0
0.0: Broker: Trying to Create VM #17 in Datacenter_0
0.0: Broker: Trying to Create VM #18 in Datacenter_0
0.0: Broker: Trying to Create VM #19 in Datacenter_0
[VmScheduler.vmCreate] Allocation of VM #6 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #6 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #7 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #7 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #8 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #8 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #9 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #9 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #10 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #10 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #11 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #11 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #12 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #12 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #13 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #13 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #14 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #14 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #15 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #15 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #16 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #16 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #17 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #17 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #18 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #18 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #19 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #19 to Host #1 failed by MIPS
0.1: Broker: VM #0 has been created in Datacenter #2, Host #0
0.1: Broker: VM #1 has been created in Datacenter #2, Host #0
0.1: Broker: VM #2 has been created in Datacenter #2, Host #0
0.1: Broker: VM #3 has been created in Datacenter #2, Host #1
0.1: Broker: VM #4 has been created in Datacenter #2, Host #0
0.1: Broker: VM #5 has been created in Datacenter #2, Host #1
0.1: Broker: Creation of VM #6 failed in Datacenter #2
0.1: Broker: Creation of VM #7 failed in Datacenter #2
0.1: Broker: Creation of VM #8 failed in Datacenter #2
0.1: Broker: Creation of VM #9 failed in Datacenter #2
0.1: Broker: Creation of VM #10 failed in Datacenter #2
0.1: Broker: Creation of VM #11 failed in Datacenter #2
0.1: Broker: Creation of VM #12 failed in Datacenter #2
0.1: Broker: Creation of VM #13 failed in Datacenter #2
0.1: Broker: Creation of VM #14 failed in Datacenter #2
0.1: Broker: Creation of VM #15 failed in Datacenter #2
0.1: Broker: Creation of VM #16 failed in Datacenter #2
0.1: Broker: Creation of VM #17 failed in Datacenter #2
0.1: Broker: Creation of VM #18 failed in Datacenter #2
0.1: Broker: Creation of VM #19 failed in Datacenter #2
0.1: Broker: Trying to Create VM #6 in Datacenter_1
0.1: Broker: Trying to Create VM #7 in Datacenter_1
0.1: Broker: Trying to Create VM #8 in Datacenter_1
0.1: Broker: Trying to Create VM #9 in Datacenter_1
0.1: Broker: Trying to Create VM #10 in Datacenter_1
0.1: Broker: Trying to Create VM #11 in Datacenter_1
0.1: Broker: Trying to Create VM #12 in Datacenter_1
0.1: Broker: Trying to Create VM #13 in Datacenter_1
0.1: Broker: Trying to Create VM #14 in Datacenter_1
0.1: Broker: Trying to Create VM #15 in Datacenter_1
0.1: Broker: Trying to Create VM #16 in Datacenter_1
0.1: Broker: Trying to Create VM #17 in Datacenter_1
0.1: Broker: Trying to Create VM #18 in Datacenter_1
0.1: Broker: Trying to Create VM #19 in Datacenter_1
[VmScheduler.vmCreate] Allocation of VM #12 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #12 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #13 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #13 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #14 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #14 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #15 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #15 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #16 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #16 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #17 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #17 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #18 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #18 to Host #1 failed by MIPS
[VmScheduler.vmCreate] Allocation of VM #19 to Host #0 failed by RAM
[VmScheduler.vmCreate] Allocation of VM #19 to Host #1 failed by MIPS
0.2: Broker: VM #6 has been created in Datacenter #3, Host #0
0.2: Broker: VM #7 has been created in Datacenter #3, Host #0
0.2: Broker: VM #8 has been created in Datacenter #3, Host #0
0.2: Broker: VM #9 has been created in Datacenter #3, Host #1
0.2: Broker: VM #10 has been created in Datacenter #3, Host #0
0.2: Broker: VM #11 has been created in Datacenter #3, Host #1
0.2: Broker: Creation of VM #12 failed in Datacenter #3
0.2: Broker: Creation of VM #13 failed in Datacenter #3
0.2: Broker: Creation of VM #14 failed in Datacenter #3
0.2: Broker: Creation of VM #15 failed in Datacenter #3
0.2: Broker: Creation of VM #16 failed in Datacenter #3
0.2: Broker: Creation of VM #17 failed in Datacenter #3
0.2: Broker: Creation of VM #18 failed in Datacenter #3
0.2: Broker: Creation of VM #19 failed in Datacenter #3
0.2: Broker: Sending cloudlet 0 to VM #0
0.2: Broker: Sending cloudlet 1 to VM #1
0.2: Broker: Sending cloudlet 2 to VM #2
0.2: Broker: Sending cloudlet 3 to VM #3
0.2: Broker: Sending cloudlet 4 to VM #4
0.2: Broker: Sending cloudlet 5 to VM #5
0.2: Broker: Sending cloudlet 6 to VM #6
0.2: Broker: Sending cloudlet 7 to VM #7
0.2: Broker: Sending cloudlet 8 to VM #8
0.2: Broker: Sending cloudlet 9 to VM #9
0.2: Broker: Sending cloudlet 10 to VM #10
0.2: Broker: Sending cloudlet 11 to VM #11
0.2: Broker: Sending cloudlet 12 to VM #0
0.2: Broker: Sending cloudlet 13 to VM #1
0.2: Broker: Sending cloudlet 14 to VM #2
0.2: Broker: Sending cloudlet 15 to VM #3
0.2: Broker: Sending cloudlet 16 to VM #4
0.2: Broker: Sending cloudlet 17 to VM #5
0.2: Broker: Sending cloudlet 18 to VM #6
0.2: Broker: Sending cloudlet 19 to VM #7
0.2: Broker: Sending cloudlet 20 to VM #8
0.2: Broker: Sending cloudlet 21 to VM #9
0.2: Broker: Sending cloudlet 22 to VM #10
0.2: Broker: Sending cloudlet 23 to VM #11
0.2: Broker: Sending cloudlet 24 to VM #0
0.2: Broker: Sending cloudlet 25 to VM #1
0.2: Broker: Sending cloudlet 26 to VM #2
0.2: Broker: Sending cloudlet 27 to VM #3
0.2: Broker: Sending cloudlet 28 to VM #4
0.2: Broker: Sending cloudlet 29 to VM #5
0.2: Broker: Sending cloudlet 30 to VM #6
0.2: Broker: Sending cloudlet 31 to VM #7
0.2: Broker: Sending cloudlet 32 to VM #8
0.2: Broker: Sending cloudlet 33 to VM #9
0.2: Broker: Sending cloudlet 34 to VM #10
0.2: Broker: Sending cloudlet 35 to VM #11
0.2: Broker: Sending cloudlet 36 to VM #0
0.2: Broker: Sending cloudlet 37 to VM #1
0.2: Broker: Sending cloudlet 38 to VM #2
0.2: Broker: Sending cloudlet 39 to VM #3
3.1980000000000004: Broker: Cloudlet 4 received
3.1980000000000004: Broker: Cloudlet 16 received
3.1980000000000004: Broker: Cloudlet 28 received
3.1980000000000004: Broker: Cloudlet 5 received
3.1980000000000004: Broker: Cloudlet 17 received
3.1980000000000004: Broker: Cloudlet 29 received
3.1980000000000004: Broker: Cloudlet 6 received
3.1980000000000004: Broker: Cloudlet 18 received
3.1980000000000004: Broker: Cloudlet 30 received
3.1980000000000004: Broker: Cloudlet 7 received
3.1980000000000004: Broker: Cloudlet 19 received
3.1980000000000004: Broker: Cloudlet 31 received
3.1980000000000004: Broker: Cloudlet 8 received
3.1980000000000004: Broker: Cloudlet 20 received
3.1980000000000004: Broker: Cloudlet 32 received
3.1980000000000004: Broker: Cloudlet 10 received
3.1980000000000004: Broker: Cloudlet 22 received
3.1980000000000004: Broker: Cloudlet 34 received
3.1980000000000004: Broker: Cloudlet 9 received
3.1980000000000004: Broker: Cloudlet 21 received
3.1980000000000004: Broker: Cloudlet 33 received
3.1980000000000004: Broker: Cloudlet 11 received
3.1980000000000004: Broker: Cloudlet 23 received
3.1980000000000004: Broker: Cloudlet 35 received
4.198: Broker: Cloudlet 0 received
4.198: Broker: Cloudlet 12 received
4.198: Broker: Cloudlet 24 received
4.198: Broker: Cloudlet 36 received
4.198: Broker: Cloudlet 1 received
4.198: Broker: Cloudlet 13 received
4.198: Broker: Cloudlet 25 received
4.198: Broker: Cloudlet 37 received
4.198: Broker: Cloudlet 2 received
4.198: Broker: Cloudlet 14 received
4.198: Broker: Cloudlet 26 received
4.198: Broker: Cloudlet 38 received
4.198: Broker: Cloudlet 3 received
4.198: Broker: Cloudlet 15 received
4.198: Broker: Cloudlet 27 received
4.198: Broker: Cloudlet 39 received
4.198: Broker: All Cloudlets executed. Finishing...
4.198: Broker: Destroying VM #0
4.198: Broker: Destroying VM #1
4.198: Broker: Destroying VM #2
4.198: Broker: Destroying VM #3
4.198: Broker: Destroying VM #4
4.198: Broker: Destroying VM #5
4.198: Broker: Destroying VM #6
4.198: Broker: Destroying VM #7
4.198: Broker: Destroying VM #8
4.198: Broker: Destroying VM #9
4.198: Broker: Destroying VM #10
4.198: Broker: Destroying VM #11
Broker is shutting down...
Simulation: No more future events
CloudInformationService: Notify all CloudSim entities for shutting down.
Datacenter_0 is shutting down...
Datacenter_1 is shutting down...
Broker is shutting down...
Simulation completed.
Simulation completed.