2.existing System 3.proposed System 5. Uml Diagram 6. System Anaysis 7. Hardware and Software Specification 8. Implementation Conclusion References
2.existing System 3.proposed System 5. Uml Diagram 6. System Anaysis 7. Hardware and Software Specification 8. Implementation Conclusion References
2.existing System 3.proposed System 5. Uml Diagram 6. System Anaysis 7. Hardware and Software Specification 8. Implementation Conclusion References
3.PROPOSED SYSTEM
4. MODULE 5. UML DIAGRAM 6. SYSTEM ANAYSIS 7. HARDWARE AND SOFTWARE SPECIFICATION 8. IMPLEMENTATION CONCLUSION
REFERENCES
ABSTRACT
IAAS is providing users on-demand access to resources. Cloud provides must either overprovision their infrastructure or reject a large proportion of user requests. All the users may not require the resources at the same time. This infrastructure combines on-demand allocation of resources with opportunistic.
1. INTRODUCTION
IAAS cloud computing has emerged as an attractive management of physical resources. It allows users to elastically expand and contract the resources on an immediate need. Enables quick turnaround time when dealing with emergencies, working towards deadlines. It configures private clouds that allow their users a seamless commercial clouds supporting compatible VM images and cloud interfaces.
2. EXISTING SYSTEM
It is impossible to know whether the terms of the SLA are being met without monitoring and measuring the performance of the service. Service Level Management tells us how the performance information is gathered and handled.
3. PROPOSED SYSTEM
Enables quick turnaround time when dealing with emergencies, working towards deadlines.
4. MODULES
Its got 4 modules in total, and they are like, On-demand user Opportunistic user Fraud detection service
On-demand user:
Gives a user access to a resource within interactive time of making the request and make the resource available
Opportunistic user:
Gives a user access to a resource at an indeterminate time and make the resource available to the user for an
The system keeps tracks of the documents that have to be completed with in a particular time.
5. UML DIAGRAM
6. SYSTEM ANALYSIS
7. HARDWARE/SOFTWARE SPECIFICATIONS
7.1 HARDWARE SPECIFICATION
Processor Speed RAM Hard Disk - Pentium III - 1.1 Ghz - 256 MB(min) - 20 GB
7.2 SOFTWARE SYSTEM CONFIGURATION Operating System Application Server Front End Scripts Server side Script Database Database Connectivity : Windows95/98/2000/XP/2007 : Tomcat 0.6/0.7 : HTML, Java, Jsp : JavaScript. : Java Server Pages. : MYSQL : JDBC.
8. IMPLEMENTATION
9. SCREEN SHOTS
CONCLUSION
we propose a cloud infrastructure that combines ondemand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes. We increase the utilization of the cloud infrastructure, thereby decreasing the overall cost.
REFERENCES
1. Anderson D and Fedak G. The Computational and Storage Potential of Volunteer Computing, CCGRID06, 2006, p. 73-80.
2. Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D.SETI@home: An Experiment in Public-Resource Computing.Communications of the ACM, 45(11), November 2002, 56-61.
SITES REFERRED
THANK YOU