Papers by Md Hasanul Ferdaus, PhD
Bookmarks Related papers MentionsView impact
Advances in Systems Analysis, Software Engineering, and High Performance Computing
With the pragmatic realization of computing as a utility, Cloud Computing has recently emerged as... more With the pragmatic realization of computing as a utility, Cloud Computing has recently emerged as a highly successful alternative IT paradigm. Cloud providers are deploying large-scale data centers across the globe to meet the Cloud customers' compute, storage, and network resource demands. Efficiency and scalability of these data centers, as well as the performance of the hosted applications' highly depend on the allocations of the data center resources. Very recently, network-aware Virtual Machine (VM) placement and migration is developing as a very promising technique for the optimization of compute-network resource utilization, energy consumption, and network traffic minimization. This chapter presents the relevant background information and a detailed taxonomy that characterizes and classifies the various components of VM placement and migration techniques, as well as an elaborate survey and comparative analysis of the state of the art techniques. Besides highlighting t...
Bookmarks Related papers MentionsView impact
Advances in systems analysis, software engineering, and high performance computing book series, 2015
Bookmarks Related papers MentionsView impact
SSRN Electronic Journal
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2017
Bookmarks Related papers MentionsView impact
Cluster Computing, Sep 21, 2020
Bookmarks Related papers MentionsView impact
Cloud Computing has recently emerged as a highly successful alternative information technology pa... more Cloud Computing has recently emerged as a highly successful alternative information technology paradigm through on-demand resource provisioning and almost perfect reliability. In order to meet the customer demands, Cloud providers are deploying large-scale virtualized data centers consisting of thousands of servers across the world. These data centers require huge amount of electrical energy that incur very high operating cost and as a result, leave large carbon footprints. The reason behind the extremely high energy consumption is not just the amount of computing resources used, but also lies in inefficient use of these resources. Furthermore, with the recent proliferation of communication-intensive applications, network resource demands are becoming one of the key areas of performance bottleneck. As a consequence, efficient utilization of data center resources and minimization of energy consumption are emerging as critical factors for the success of Cloud Computing. This thesis ad...
Bookmarks Related papers MentionsView impact
arXiv (Cornell University), Jun 20, 2017
Bookmarks Related papers MentionsView impact
With the rapid usage of portable devices mobility in IP networks becomes more important issue in ... more With the rapid usage of portable devices mobility in IP networks becomes more important issue in the recent years. IETF standardized Mobile IP that works in Network Layer, which involves tunneling of IP packets from HA to Foreign Agent. Mobile IP suffers many problems of Triangular Routing, conflict with private addressing scheme, increase in load in HA, need of permanent home IP address, tunneling itself, and so on. In this paper, we proposed mobility management in Application Layer protocol SIP and show some comparative analysis between Mobile IP and SIP in context of mobility.
Bookmarks Related papers MentionsView impact
Next-Generation Wireless Systems, 2006
Utility bill like electric, mobile bill etc. payment is becoming a routine work to us. This is th... more Utility bill like electric, mobile bill etc. payment is becoming a routine work to us. This is the age of telecommunication. So, utility bill payment using telecom support will be a wonder-work. This paper will show the various ways that we can use to pay our utility bills using telecom support. At the same time it will provide the reason behind this automation.
Bookmarks Related papers MentionsView impact
Cloud Computing, Computer Communications and Networks, 2014
With immense success and rapid growth within the last few years, cloud computing has been establi... more With immense success and rapid growth within the last few years, cloud computing has been established as the dominant paradigm of IT industry. In order to meet the increasing demand of computing and storage resources, infra-structure cloud providers are deploying planet-scale data centers across the world, consisting of hundreds of thousands, even millions of servers. These data centers incur very high investment and operating costs for the compute and network devices as well as for the energy consumption. Moreover, because of the huge energy usage, such data centers leave large carbon footprints and thus have adverse effects on the environment. As a result, efficient computing resource utilization and energy consumption reduction are becoming crucial issues to make cloud computing successful. Intelligent workload placement and relocation is one of the primary means to address these issues. This chapter presents an overview of the infra-structure resource management systems and technologies, and detailed description of the proposed solution approaches for efficient cloud resource utilization and minimization of power consumption and resource wastages. Different types of server consolidation mechanisms are presented along with the solution approaches proposed by the researchers of both academia and industry. Various aspects of workload reconfiguration mechanisms and existing works on workload relocation techniques are described.
Bookmarks Related papers MentionsView impact
Scalability is one of the design goals that Application Layer Multicast (ALM) protocols address. ... more Scalability is one of the design goals that Application Layer Multicast (ALM) protocols address. An efficient way to achieve scalability is to arrange the members of an ALM group in a hierarchical cluster-oriented overlay network (e.g., NICE). So, the security mechanisms for such ALM protocols need to be scalable as well. Moreover, ALM protocols provide possibilities to adapt new ways of security mechanisms, for example self-certifying node identifiers that can be used for node authentication without resorting to a trusted third party. ALM protocols are often used for group communication in overlay networks that are formed spontaneously by members. These overlay networks exhibit high dynamics of nodes joining and leaving the multicast groups. Thus, the security solutions of such ALM protocols need to consider these dynamics. Security services in group communication systems, for example video conferencing, have different properties than their counter parts in point-to-point communica...
Bookmarks Related papers MentionsView impact
Lecture Notes in Computer Science, 2014
Bookmarks Related papers MentionsView impact
Journal of Network and Computer Applications, Nov 1, 2017
Bookmarks Related papers MentionsView impact
Cloud Computing has recently emerged as a highly successful alternative information technology pa... more Cloud Computing has recently emerged as a highly successful alternative information technology paradigm through on-demand resource provisioning and almost perfect reliability. In order to meet the customer demands, Cloud providers are deploying large-scale virtualized data centers consisting of thousands of servers across the world. These data centers require huge amount of electrical energy that incur very high operating cost and as a result, leave large carbon footprints. The reason behind the extremely high energy consumption is not just the amount of computing resources used, but also lies in inefficient use of these resources. Furthermore, with the recent proliferation of communication intensive applications, network resource demands are becoming one of the key areas of performance bottleneck. As a consequence, efficient utilization of data center resources and minimization of energy consumption are emerging as critical factors for the success of Cloud Computing. This thesis addresses the above mentioned resource and energy related issues by tackling through data center-level resource management, in particular, by efficient Virtual Machine (VM) placement and consolidation strategies. The problem of high resource wastage and energy consumption is dealt with an online consolidated VM cluster placement scheme, utilizing the Ant Colony Optimization (ACO) metaheuristic and a vector algebra-based multi-dimensional resource utilization model. In addition, optimization of network resource utilization is addressed by an online network-aware VM cluster placement strategy in order to localize data traffic among communicating VMs and reduce traffic load in data center interconnects that, in turn, reduces communication overhead in the upper layer network switches. Besides the online placement schemes that optimize the VM placement during the initial VM deployment phase, an offline decentralized dynamic VM consolidation framework and an associated algorithm leveraging VM live migration technique are presented to further optimize the run-time resource usage and energy consumption, along with migration overhead minimization. Such migration-aware dynamic VM consolidation strategy uses realistic VM migration parameters to estimate impacts of necessary VM migrations on data center and hosted applications. Simulation-based performance evaluation using representative workloads demonstrates that the proposed VM placement and consolidation strategies are capable of outperforming the state-of-the-art techniques, in the context of large data centers, by reducing energy consumption up to 29%, server resource wastage up to 85%, and network load up to 60%.
Bookmarks Related papers MentionsView impact
Emerging Research in Cloud Distributed Computing Systems, May 18, 2015
With the pragmatic realization of computing as a utility, Cloud Computing is has recently emerged... more With the pragmatic realization of computing as a utility, Cloud Computing is has recently emerged as a highly successful alternative IT paradigm through on-demand resource provisioning and almost perfect reliability. The rapidly growing customer demands for computing and storage resources are responded by the Cloud providers with the deployment of large scale data centers across the globe. Efficiency and scalability of these data centers, as well as the performance of the hosted applications highly depend on the allocations of the physical resource (e.g., CPU, memory, storage, and network bandwidth). Very recently, network-aware Virtual Machine (VM) placement and migration is developing as a very promising technique for the optimization of compute-network resource utilization, energy consumption, and network traffic minimization. This chapter presents the related background information and a taxonomy that characterizes and classifies the various components of network-aware VM placement and migration techniques. An elaborate survey and comparative analysis of the state of the art techniques is also put forward. Besides highlighting the various aspects and insights of the network-aware VM placement and migration strategies and algorithms recently proposed by the research community, the survey further identifies the limitations of the existing techniques and discusses on the future research directions.
Bookmarks Related papers MentionsView impact
Cloud Computing: Challenges, Limitations and R&D Solutions, 2014
With immense success and rapid growth within the last few years, cloud computing has been establi... more With immense success and rapid growth within the last few years, cloud computing has been established as the dominant paradigm of IT industry. In order to meet the increasing demand of computing and storage resources, infra-structure cloud providers are deploying planet-scale data centers across the world, consisting of hundreds of thousands, even millions of servers. These data centers incur very high investment and operating costs for the compute and network devices as well as for the energy consumption. Moreover, because of the huge energy usage, such data centers leave large carbon footprints and thus have adverse effects on the environment. As a result, efficient computing resource utilization and energy consumption reduction are becoming crucial issues to make cloud computing successful. Intelligent workload placement and relocation is one of the primary means to address these issues. This chapter presents an overview of the infra-structure resource management systems and technologies, and detailed description of the proposed solution approaches for efficient cloud resource utilization and minimization of power consumption and resource wastage. Different types of server consolidation mechanisms are presented along with the solution approaches proposed by the researchers of both academia and industry. Various aspects of workload reconfiguration mechanisms and existing works on workload relocation techniques are described.
Bookmarks Related papers MentionsView impact
In this paper, we propose the AVVMC VM consolidation
scheme that focuses on balanced resource ut... more In this paper, we propose the AVVMC VM consolidation
scheme that focuses on balanced resource utilization of servers across different computing resources (CPU, memory, and network I/O) with the goal of minimizing power consumption and resource wastage. Since the VM consolidation problem is strictly NP-hard and computationally infeasible for large data centers, we propose adaptation and integration of the Ant Colony Optimization (ACO) metaheuristic with balanced usage of computing resources based on vector algebra. Our simulation results show that AVVMC outperforms existing methods and achieves improvement in both energy consumption and resource wastage reduction.
Bookmarks Related papers MentionsView impact
Scalability is one of the design goals that Application Layer Multicast (ALM) protocols address. ... more Scalability is one of the design goals that Application Layer Multicast (ALM) protocols address. An efficient way to achieve scalability is to arrange the members of an ALM group in a hierarchical cluster-oriented overlay network (e.g., NICE). So, the security mechanisms for such ALM protocols need to be scalable as well. Moreover, ALM protocols provide possibilities to adapt new ways of security mechanisms, for example self-certifying node identifiers that can be used for node authentication without resorting to a trusted third party. ALM protocols are often used for group communication in overlay networks that are formed spontaneously by members. These overlay networks exhibit high dynamics of nodes joining and leaving the multicast groups. Thus, the security solutions of such ALM protocols need to consider these dynamics.
Security services in group communication systems, for example video conferencing, have different properties than their counter parts in point-to-point communication systems, like client-server. Establishing data confidentiality in group environments requires more complex and costlier operations than two-party systems. Also, since data in ALM may be read by a non-member attacker using a network sniffer, data confidentiality mechanisms in ALM protocols are important and need to be efficient and highly scalable. Node authentication is another essential security requirement in ALM protocols to prevent a malicious node from impersonating other nodes. Furthermore, proof-of-membership in ALM environments is an important security service that prevents illegitimate nodes from joining multicast groups. Moreover, future ALM protocols may provide multiple communication groups for different application contexts within a single control environment, as envisioned for the Multicast/Multipeer-Overlay (MCP-O) service of the Spontaneous Virtual Networks (SpoVNet) research project. Security requirements for such groups have some additional properties and establishing security efficiently for them poses new challenges.
Bookmarks Related papers MentionsView impact
With the rapid usage of portable devices mobility in IP networks becomes more important issue in ... more With the rapid usage of portable devices mobility in IP networks becomes more important issue in the recent years. IETF standardized Mobile IP that works in Network Layer, which involves tunneling of IP packets from HA to Foreign Agent. Mobile IP suffers many problems of Triangular Routing, conflict with private addressing scheme, increase in load in HA, need of permanent home IP address, tunneling itself, and so on. In this paper, we proposed mobility management in Application Layer protocol SIP and show some comparative analysis between Mobile IP and SIP in context of mobility.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Md Hasanul Ferdaus, PhD
scheme that focuses on balanced resource utilization of servers across different computing resources (CPU, memory, and network I/O) with the goal of minimizing power consumption and resource wastage. Since the VM consolidation problem is strictly NP-hard and computationally infeasible for large data centers, we propose adaptation and integration of the Ant Colony Optimization (ACO) metaheuristic with balanced usage of computing resources based on vector algebra. Our simulation results show that AVVMC outperforms existing methods and achieves improvement in both energy consumption and resource wastage reduction.
Security services in group communication systems, for example video conferencing, have different properties than their counter parts in point-to-point communication systems, like client-server. Establishing data confidentiality in group environments requires more complex and costlier operations than two-party systems. Also, since data in ALM may be read by a non-member attacker using a network sniffer, data confidentiality mechanisms in ALM protocols are important and need to be efficient and highly scalable. Node authentication is another essential security requirement in ALM protocols to prevent a malicious node from impersonating other nodes. Furthermore, proof-of-membership in ALM environments is an important security service that prevents illegitimate nodes from joining multicast groups. Moreover, future ALM protocols may provide multiple communication groups for different application contexts within a single control environment, as envisioned for the Multicast/Multipeer-Overlay (MCP-O) service of the Spontaneous Virtual Networks (SpoVNet) research project. Security requirements for such groups have some additional properties and establishing security efficiently for them poses new challenges.
scheme that focuses on balanced resource utilization of servers across different computing resources (CPU, memory, and network I/O) with the goal of minimizing power consumption and resource wastage. Since the VM consolidation problem is strictly NP-hard and computationally infeasible for large data centers, we propose adaptation and integration of the Ant Colony Optimization (ACO) metaheuristic with balanced usage of computing resources based on vector algebra. Our simulation results show that AVVMC outperforms existing methods and achieves improvement in both energy consumption and resource wastage reduction.
Security services in group communication systems, for example video conferencing, have different properties than their counter parts in point-to-point communication systems, like client-server. Establishing data confidentiality in group environments requires more complex and costlier operations than two-party systems. Also, since data in ALM may be read by a non-member attacker using a network sniffer, data confidentiality mechanisms in ALM protocols are important and need to be efficient and highly scalable. Node authentication is another essential security requirement in ALM protocols to prevent a malicious node from impersonating other nodes. Furthermore, proof-of-membership in ALM environments is an important security service that prevents illegitimate nodes from joining multicast groups. Moreover, future ALM protocols may provide multiple communication groups for different application contexts within a single control environment, as envisioned for the Multicast/Multipeer-Overlay (MCP-O) service of the Spontaneous Virtual Networks (SpoVNet) research project. Security requirements for such groups have some additional properties and establishing security efficiently for them poses new challenges.