Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 19

Publish Log In Sign Up Top of Form Search Bottom of Form Explore Documents Books - FictionBooks - Non-fictionHealth & MedicineBrochures/CatalogsGovernment

DocsHow-To Guides/ManualsMagazines/NewspapersRecipes/MenusSchool Work+ all categories RecentFeatured People AuthorsStudentsResearchersPublishersGovernment & NonprofitsBusinessesMusiciansArtists & DesignersTeachers+ all categories Most FollowedPopular Download 0 Go BackComment Link Embed Zoom of 45 Readcast 0inShare

EXPLOITING DYNAMIC RESOURCE ALLOCATIONFOR EFFICIENT PARALLEL DATA PROCESSING INTHE CLOUD INTRODUCTION In recent years ad hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computingcompanies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs.However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud.Consequently, the allocated compute resources may be inadequate for big parts of thesubmitted job and unnecessarily increase processing time and cost.In this paper, we discuss the opportunities and challenges for efficient parallel data processing in clouds and present our research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered bytoday's IaaS clouds for both, task scheduling and execution.Particular tasks of a processing job can be assigned to different types of virtual machineswhich are automatically instantiated and terminated during the job execution. Based on thisnew framework, we perform extended evaluations of MapReduce-inspired processing jobson an IaaS cloud system and compare the results to the popular data processing framework Hadoop. EXISTING SYSTEM: A growing number of companies have to process huge amounts of data in a costefficientmanner. Classic representatives for these companies are operators of Internet search engines. Thevast amount of data they have to deal with every day has made traditional database solutions prohibitivelyExpensive .Instead, these companies have popularized an architectural paradigm based on a largenumber of commodity servers. Problems like processing crawled documents or regenerating a webindex are split into several independent subtasks, distributed among the available nodes, andcomputed in parallel. PROPOSED SYSTEM: In recent years a variety of systems to facilitate MTC has been developed. Although thesesystems typically share common goals (e.g. to hide issues of parallelism or fault tolerance), theyaim at different fields of application. MapReduce is designed to run data analysis jobs on a largeamount of data, which is expected to be stored across a large set of share-nothing commodityservers.Once a user has fit his program into the required map and reduce pattern, the executionframework takes care of splitting the job into subtasks, distributing and executing them. A singleMap Reduce job always consists of a distinct map and reduce program. ALGORITHMS:1.Job Scheduling and Execution: After having received a valid Job Graph from the user, Nepheles Job Manager transforms it into a so-called Execution Graph. An Execution Graph is Nepheles primarydata structure for scheduling and monitoring the execution of a Nephele job. Unlike theabstract Job Graph, the Execution Graph contains all the concrete information required toschedule and execute the received job on the cloud.

2. Parallelization and Scheduling Strategies: If constructing an Execution Graph from a users submitted Job Graph may leavedifferent degrees of freedom to Nephele. The user provides any job annotation whichcontains more specific instructions we currently pursue simple default strategy: Eachvertex of the Job Graph is transformed into one Execution Vertex. The default channeltypes are network channels. Each Execution Vertex is by default assigned to its ownExecution Instance unless the users annotations or other scheduling restrictions (e.g. theusage of in-memory channels) prohibit it. MODULE DESCRIPTION:1. NETWORK MODULE: Server - Client computing or networking is a distributed application architecture that partitionstasks or workloads between service providers (servers) and service requesters, called clients. Oftenclients and servers operate over a computer network on separate hardware. A server machine is ahigh-performance host that is running one or more server programs which share its resources withclients. A client also shares any of its resources; Clients therefore initiate communication sessionswith servers which await (listen to) incoming requests. 2. LBS SERVICES: In particular, users are reluctant to use LBSs, since revealing their position may link to their identity. Even though a user may create a fake ID to access the service, her location alone maydisclose her actual identity. Linking a position to an individual is possible by various means,suchas publicly available information city maps. When a user u wishes to pose a query, she sends her location to a trusted server, the anonymizer through a secure connection (SSL). The latter obfuscates her location, replacing it with an anonymizing spatial region (ASR) that encloses u. TheASR is then forwarded to the LS. Ignoring where exactly u is, the LS retrieves (and reports to theAZ) a candidate set (CS) that is guaranteed to contain the query results for any possible user location inside the ASR. The AZ receives the CS and reports to u the subset of candidates thatcorresponds to her original query. 3. SYSTEM MODEL: The ASR construction at the anonymization process abides by the users privacy requirements.Particularly, specified an anonymity degree K by u, the ASR satisfies two properties: (i) it containsu and at least another K * 1 users, and (ii) even if the LS knew the exact locations of all users inthe system. We propose an edge ordering anonymization approach for users in road networks, whichguarantees K-anonymity under the strict reciprocity requirement (described later). We identify the crucial concept of border nodes, an important indicator of the CS size andof the query processing cost at the LS. We consider various edge orderings, and qualitatively assess their query performance basedon border nodes.

We design efficient query processing mechanisms that exploit existing network databaseinfrastructure, and guarantee CS inclusiveness and minimality. Furthermore, they apply tovarious network storage schemes. We devise batch execution techniques for anonymous queries that significantly reduce theoverhead of the LS by computation sharing. 4. SCHEDULED TASK: Recently, considerable research interest has focused on preventing identity inference inlocation-based services. Proposing spatial cloaking techniques. In the following, we describeexisting techniques for ASR computation (at the AZ) and query processing (at the LS). At the end,we cover alternative location privacy approaches and discuss why they are inappropriate to our problem setting. This offers privacy protection in the sense that the actual user position u cannot bedistinguished from others in the ASR, even when malicious LS is equipped/advanced enough to possess all user locations. This spatial K-anonymity model is most widely used in location privacyresearch/applications, even though alternative models are emerging. 5. QUERY PROCESSING: Processing is based on implementation of the theorem uses (network-based) search operationsas off the shelf building blocks. Thus, the NAP query evaluation methodology is readilydeployable on existing systems, and can be easily adapted to different network storage schemes. Inthis case, the queries are evaluated in a batch. we propose the networkbased anonymization and processing (NAP) framework, the first system for K- anonymous query processing in roadnetworks. NAP relies on a global user ordering and bucketization that satisfies reciprocity andguarantees K-anonymity. We identify the ordering characteristics that affect subsequent processing, and qualitatively compare alternatives. Then, we propose query evaluation techniquesthat exploit these characteristics. In addition to user privacy, NAP achieves low computational andcommunication costs, and quick responses overall. It is readily deployable, requiring only basicnetwork operations. HARDWARE & SOFTWARE REQUIREMENTS:HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive: 1.44 Mb. Ram : 512 MB. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional. Coding Language : ASP .Net,C# Database :Sql Server 2005.

2. SYSTEM STUDY 2.1 FEASIBILITY STUDY The feasibility of the project is analyzed in this phase and business proposalis put forth with a very general plan for the project and some cost estimates.During system analysis the feasibility study of the proposed system is to be carriedout. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the systemis essential.Three key considerations involved in the feasibility analysis are ECONOMICAL FEASIBILITY TECHNICAL FEASIBILITY SOCIAL FEASIBILITY ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the systemwill have on the organization. The amount of fund that the company can pour intothe research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this wasachieved because most of the technologies used are freely available. Only thecustomized products had to be purchased. TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility, that is, thetechnical requirements of the system. Any system developed must not have a highdemand on the available technical resources. This will lead to high demands on theavailable technical resources. This will lead to high demands being placed on theclient. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. SOCIAL FEASIBILITY The aspect of study is to check the level of acceptance of the system bythe user. This includes the process of training the user to use the system efficiently.The user must not feel threatened by the system, instead must accept it as anecessity. The level of acceptance by the users solely depends on the methods thatare employed to educate the user about the system and to make him familiar withit. His level of confidence must be raised so that he is also able to make someconstructive criticism, which is welcomed, as he is the final user of the system. 4. SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes thecomplete requirement of the system. It means for use by developers and will be the

basic duringtesting phase. Any changes made to the requirements in the future will have to go through formalchange approval process.SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral Model of SoftwareDevelopment and Enhancement. This model was not the first model to discuss iterativedevelopment, but it was the first model to explain why the iteration models.As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase startswith a design goal and ends with a client reviewing the progress thus far. Analysis andengineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usuallyinvolves interviewing a number of users representing all the external or internal usersand other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This isusually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure:1.Evaluating the first prototype in terms of its strengths, weakness, and risks.2.Defining the requirements of the second prototype.3.Planning an designing the second prototype.4.Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great.Risk factors might involved development cost overruns, operating-cost miscalculation,or any other factor that could, in the customers judgment, result in a lessthan-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype,and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototyperepresents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like:

ADVANTAGES: Estimates(i.e. budget, schedule etc .) become more relistic as work progresses, becauseimportant issues discovered earlier.

It is more able to cope with the changes that are software development generally entails. Software engineers can get their hands in and start working on the core of a project earlier. 7. UML DiagramsUnified Modeling Language : The Unified Modeling Language allows the software engineer to express an analysis model usingthe modeling notation that is governed by a set of syntactic semantic and pragmatic rules.A UML system is represented using five different views that describe the system fromdistinctly different perspective. Each view is defined by a set of diagram, which is as follows. User Model Viewi.This view represents the system from the users perspective.ii.The analysis representation describes a usage scenario from the end-users perspective. Structural model viewi.In this model the data and functionality are arrived from inside the system.ii.This model view models the static structures. Behavioral Model ViewIt represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the user model and structural modelview. Implementation Model ViewIn this the structural and behavioral as parts of the system are represented as they are to be built. Environmental Model ViewIn this the structural and behavioral aspects of the environment in which the system is to beimplemented are represented.UML is specifically constructed through two different domains they are: UML Analysis modeling, this focuses on the user model and structural model views of thesystem. UML design modeling, which focuses on the behavioral modeling, implementation modelingand environmental model views.Use case Diagrams represent the functionality of the system from a users point of view. Use casesare used during requirements elicitation and analysis to represent the functionality of the system.Use cases focus on the behavior of the system from external point of view.Actors are external entities that interact with the system. Examples of actors include users likeadministrator, bank customer etc., or another system like central database. 9.2 IMPLEMENTATIONHTML HTML, an initialize of Hypertext Markup Language, is the predominant markup language for web pages. It provides a means to describe the structure of text-based information in a document bydenoting certain text as headings, paragraphs, lists, and so on and to supplement that text withinteractive forms, embedded images, and other objects. HTML is

written in the form of labels(known as tags), surrounded by angle brackets. HTML can also describe, to some degree, theappearance and semantics of a document, and can include embedded scripting language codewhich can affect the behavior of web browsers and other HTML processors.HTML is also often used to refer to content of the MIME type text/html or even more broadly as ageneric term for HTML whether in its XML-descended form (such as XHTML 1.0 and later) or itsform descended directly from SGMLHyper Text Markup LanguageHypertext Markup Language (HTML), the languages of the World Wide Web (WWW), allowsusers to produces Web pages that include text, graphics and pointer to other Web pages(Hyperlinks).HTML is not a programming language but it is an application of ISO Standard 8879, SGML(Standard Generalized Markup Language), but specialized to hypertext and adapted to the Web.The idea behind Hypertext is that instead of reading text in rigid linear structure, we can easily jump from one point to another point. We can navigate through the information based on our interest and preference. A markup language is simply a series of elements, each delimited withspecial characters that define how text or other items enclosed within the elements should bedisplayed. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document.HTML can be used to display any type of document on the host computer, which can begeographically at a different location. It is a versatile language and can be used on any platform or desktop. HTML provides tags (special codes) to make the document look attractive. HTML tags are notcase-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the presentation of thedocument. Anything that is not a tag is part of the document itself.Basic HTML Tags:<! -- -->specifies comments<A>.</A>Creates hypertext links<B>.</B>Formats text as bold<BIG>.</BIG> Formats text in large font.Contains all tags and text in the HTML document<CENTER>...</CENTER> Creates text<DD></DD>Definition of a term<DL>...</DL>Creates definition list<FONT> </FONT> Formats text with a particular font<FORM>...</FORM>Encloses a fill-out formDefines a particular frame in a set of frames<H#></H#>Creates headings of different levels( 1 6 )Contains tags that specify information about a document<HR>...</HR>Creates a horizontal rule<HTML></HTML> Contains all other HTML tagsProvides meta-information about a document<SCRIPT></SCRIPT> Contains client-side or server-side script

Top of Form Search Bottom of Form Search History: Searching... Result 00 of 00 00 results for result for p. projectdocumentation-120414013011-phpapp02 Download or Print

Add To Collection 107 Reads 1 Readcasts 0 Embed Views This is a private document.

Published by nishuskyblue Follow Top of Form Search Bottom of Form TIP Press Ctrl-FF to search anywhere in the document.

Info and Rating Category: Uncategorized. Rating: Upload Date: 05/17/2012 Copyright: Attribution Non-commercial Tags: This document has no tags. Free download as PDF File (.pdf), text file (.txt) or read online for free. Flag document for inapproriate content More From This User

18 p. R09-CSE-Lab-3-4 nishuskyblue 5 Reads

45 p. projectdocumentation-120414013011-phpapp02 nishuskyblue 107 Reads Related

16 p. DMir_1912_05_14_01-titanic Trilogia Titanicware 64 Reads

419 p. Disappearing Cryptography d2707974 625 Reads

2 p. Steven Riznyk Mitchell Davis 1055 Reads Next 419 p. Disappearing Cryptography singingstrings 32 Reads 12 p. ConceptualModeling-p112-navathe Nikhil Dhawan 14 Reads 30 p. Vedic Mathematical Concepts and Their Application - Kapoor AMTR 90 Reads Previous| Next 281 p. Kac, Rota, Schwartz - Discrete Thoughts - Essays on Mathematics, Sc... lenixen

400 Reads 47 p. Does I_OCK SHARED acquire an S lock or an SIX lock [9]? If the alinushca88 757 Reads 47 p. Procedure call instead of GO TO on WHENEVER alinushca88 757 Reads Previous| Next 47 p. 3401 alinushca88 757 Reads 2 p. Made in Marrakech fte ses 5 ans Tendre Tazi 20 Reads 2 p. Gemini 24: Children skating on ice Starling 32 Reads Previous| Next 144 p. Upstream Interm B2 WorkBook(2) kwiat134 2596 Reads

7 p. Agriculture Law: 06-01 aglaw 234 Reads 16 p. DMir_1912_05_23_001-navio misterioso Trilogia Titanicware 81 Reads Previous| Next 110 p. January 1986, Science of Mind Magazine Matthew Thompson 99 Reads 1 p. Man + Wife Typographic Poster Stephanie S 21 Reads 8 p. LM System Description Bob Andrepont 137 Reads Previous| Next 38 p. Fitness Guide Aubrie Goodson 307 Reads 1048 p.

discrete maths Kartik Maheshbhai Mehta 785 Reads 48 p. 2600: The Hacker Quarterly (Volume 5, Number 2, Summer 1988) Ranko Kohime 526 Reads Previous| Next 52 p. The Stony Brook Press - Volume 27, Issue 3 The Stony Brook Press 1044 Reads Previous Leave a Comment Top of Form Comment must not be empty. You must be logged in to leave a comment. Submit Characters: 400 Bottom of Form Top of Form Comment must not be empty. You must be logged in to leave a comment. Submit Characters: ... Bottom of Form Use your Facebook login and see what your friends are reading and sharing. Other login options Login with Facebook Top of Form Bottom of Form Signup I don't have a Facebook account Top of Form

email address (required) create username (required) password (required) Send me the Scribd Newsletter, and occasional account related communications. Sign Up Privacy policy You will receive email notifications regarding your account activity. You can manage these notifications in your account settings. We promise to respect your privacy. Bottom of Form Why Sign up? 1. Discover and Connect With people of similar interests 2. Publish Your Documents Quickly and easily 3. Share Your Reading Interest On Scribd and social sites like Facebook and Twitter Already have a Scribd account? Top of Form email address or username password Log In Trouble logging in? Bottom of Form Login Successful Sign Up Successful Now bringing you back...

Reset Your Password Back to Login Please enter your email address below to reset your password. We will send you an email with instructions on how to continue. Top of Form Email Address: You need to provide a login for this account as well. Login Submit Bottom of Form About About Scribd Blog Join our team! Contact Us Advertise with us

Get started AdChoices Support Help FAQ Press Partners Publishers Developers / API Legal Terms Privacy Copyright Copyright 2012 Scribd Inc. Language: English Choose the language in which you want to experience Scribd: English Espaol Portugus 40c976e8-2152-411b-abef-248e6e617fad Y2:40c976e8-2152-411b-abef-248e6e617fad

You might also like