You are on page 1of 33

CONTENTS

ABSTRACT 1. INTRODUCTION 2.EXISTING SYSTEM

3.PROPOSED SYSTEM
4. MODULE 5. UML DIAGRAM 6. SYSTEM ANAYSIS 7. HARDWARE AND SOFTWARE SPECIFICATION 8. IMPLEMENTATION CONCLUSION

REFERENCES

ABSTRACT
IAAS is providing users on-demand access to resources. Cloud provides must either overprovision their infrastructure or reject a large proportion of user requests. All the users may not require the resources at the same time. This infrastructure combines on-demand allocation of resources with opportunistic.

1. INTRODUCTION
IAAS cloud computing has emerged as an attractive management of physical resources. It allows users to elastically expand and contract the resources on an immediate need. Enables quick turnaround time when dealing with emergencies, working towards deadlines. It configures private clouds that allow their users a seamless commercial clouds supporting compatible VM images and cloud interfaces.

2. EXISTING SYSTEM
It is impossible to know whether the terms of the SLA are being met without monitoring and measuring the performance of the service. Service Level Management tells us how the performance information is gathered and handled.

3. PROPOSED SYSTEM
Enables quick turnaround time when dealing with emergencies, working towards deadlines.

Users to elastically expand and contract the resource


base available to them based on an immediate need. Both the IaaS cloud provider and HTC users by increasing the utilization of the cloud infrastructure

4. MODULES

Its got 4 modules in total, and they are like, On-demand user Opportunistic user Fraud detection service

Automation and Management service

On-demand user:
Gives a user access to a resource within interactive time of making the request and make the resource available

for period of time.


The user can deploy any VM compatible with the system.

Opportunistic user:
Gives a user access to a resource at an indeterminate time and make the resource available to the user for an

indeterminate amount of time.


The user cannot provide his or her own VM.

Fraud detection service


Its goal is to detect when the distributors data has been leaked by agents. And possibly to identify the agent who leaked the data.

Automation and Management service:


Enables the top level management to keep track of the status of the projects under their control. Monitors the completion status of project documents, to alert PLs, the completion date. The system helps the HR,GL,PM,PL,TL,TM,GM to view the status of project and helps in tracking information about the project.

The system keeps tracks of the documents that have to be completed with in a particular time.

5. UML DIAGRAM

6. SYSTEM ANALYSIS

7. HARDWARE/SOFTWARE SPECIFICATIONS
7.1 HARDWARE SPECIFICATION
Processor Speed RAM Hard Disk - Pentium III - 1.1 Ghz - 256 MB(min) - 20 GB

7.2 SOFTWARE SYSTEM CONFIGURATION Operating System Application Server Front End Scripts Server side Script Database Database Connectivity : Windows95/98/2000/XP/2007 : Tomcat 0.6/0.7 : HTML, Java, Jsp : JavaScript. : Java Server Pages. : MYSQL : JDBC.

8. IMPLEMENTATION

9. SCREEN SHOTS

CONCLUSION
we propose a cloud infrastructure that combines ondemand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes. We increase the utilization of the cloud infrastructure, thereby decreasing the overall cost.

REFERENCES

1. Anderson D and Fedak G. The Computational and Storage Potential of Volunteer Computing, CCGRID06, 2006, p. 73-80.

2. Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D.SETI@home: An Experiment in Public-Resource Computing.Communications of the ACM, 45(11), November 2002, 56-61.

SITES REFERRED

http://java.sun.com http://www.sourcefordgde.com http://www.networkcomputing.com/ http://www.roseindia.com/ http://www.java2s.com/

THANK YOU

You might also like