Grid computing is an environment where sharing of geographically distributed resources helps in
p... more Grid computing is an environment where sharing of geographically distributed resources helps in performing the computation that cannot be achieved due to limitation like not having the proper amount of storage or the computation power required by a system to execute the job. One of the important point for grid computing devices are there low power usages and no central control point which enables users to access the small devices irrespective of their geographical position with different management policies. Security is the most important concern in Grid computing environment. In this paper an attempt has been made to understand the working of gird environment and what are the necessary points need to take by an organization in terms of security design for grid computing.
One of the most promising field in computing is regarded as cloud computing, which allows users t... more One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing.
AODV is one of the most popular on-demand routing protocol. In AODV, the routes are maintained ju... more AODV is one of the most popular on-demand routing protocol. In AODV, the routes are maintained just as long as it is necessary. In AODV broadcasting of every change in the network to every node is not necessary. At any instant of the network, if any link breaks it does not affect the ongoing transmission and also no global broadcasting is required, only the affected nodes are informed locally. The aim of the paper is to study the performance of AODV in different ad hoc network scenarios. The study is carried out in two ad hoc networks, viz. MANET and Wireless Mesh Network (WMN). The AODV protocol is implemented to work with both the network scenarios. The simulation of the comparative study of AODV in MANET and in WMN is shown in this paper. And the simulation results clearly depicts that the AODV routing protocol in WMN performs much better than in MANET, as WMN is more stable in comparison to MANET. Hence it could be suggested that, AODV routing protocol is an idle choice for WMNs.
Grid computing is an environment where sharing of geographically distributed resources helps in
p... more Grid computing is an environment where sharing of geographically distributed resources helps in performing the computation that cannot be achieved due to limitation like not having the proper amount of storage or the computation power required by a system to execute the job. One of the important point for grid computing devices are there low power usages and no central control point which enables users to access the small devices irrespective of their geographical position with different management policies. Security is the most important concern in Grid computing environment. In this paper an attempt has been made to understand the working of gird environment and what are the necessary points need to take by an organization in terms of security design for grid computing.
One of the most promising field in computing is regarded as cloud computing, which allows users t... more One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing.
AODV is one of the most popular on-demand routing protocol. In AODV, the routes are maintained ju... more AODV is one of the most popular on-demand routing protocol. In AODV, the routes are maintained just as long as it is necessary. In AODV broadcasting of every change in the network to every node is not necessary. At any instant of the network, if any link breaks it does not affect the ongoing transmission and also no global broadcasting is required, only the affected nodes are informed locally. The aim of the paper is to study the performance of AODV in different ad hoc network scenarios. The study is carried out in two ad hoc networks, viz. MANET and Wireless Mesh Network (WMN). The AODV protocol is implemented to work with both the network scenarios. The simulation of the comparative study of AODV in MANET and in WMN is shown in this paper. And the simulation results clearly depicts that the AODV routing protocol in WMN performs much better than in MANET, as WMN is more stable in comparison to MANET. Hence it could be suggested that, AODV routing protocol is an idle choice for WMNs.
Uploads
performing the computation that cannot be achieved due to limitation like not having the proper amount of
storage or the computation power required by a system to execute the job. One of the important point for grid
computing devices are there low power usages and no central control point which enables users to access the
small devices irrespective of their geographical position with different management policies. Security is the
most important concern in Grid computing environment. In this paper an attempt has been made to understand
the working of gird environment and what are the necessary points need to take by an organization in terms of
security design for grid computing.
performing the computation that cannot be achieved due to limitation like not having the proper amount of
storage or the computation power required by a system to execute the job. One of the important point for grid
computing devices are there low power usages and no central control point which enables users to access the
small devices irrespective of their geographical position with different management policies. Security is the
most important concern in Grid computing environment. In this paper an attempt has been made to understand
the working of gird environment and what are the necessary points need to take by an organization in terms of
security design for grid computing.