DocumentCode :
607312
Title :
Full virtualization by re-imaging cloud hardware
Author :
Redford, M.
Author_Institution :
Univ. of Fairfax, Vienna, VA, USA
fYear :
2012
fDate :
3-5 Dec. 2012
Firstpage :
577
Lastpage :
583
Abstract :
This research paper examines the real world issues in various client organizations facing consulting services in the area of network planning, optimization, and service management. As enterprise application architecture becomes more complex, the challenges in establishing patterns to encapsulate enterprise application architecture are slowly emerging. To achieve an enterprise integration framework requires knowledge of designing, building, and deploying messaging solutions. This paper investigates how such an alternative network can be planned to accommodate the evolving technology in mobile computing and social networks. It is essentially consistent to exploit the potentials of the new technologies in designing alternative cloud networking virtual infrastructure. The current cloud computing exactly imports the traditional network architecture into the cloud without any redesigned accommodation for reliability or performance, instead of innovating totally different practical virtual network components. This paper proposes an optimized cloud network configuration using the absorptive attributes of resource sharing to ensure relatively manageable cloud service. The concept proposed in this research is the replacement of the traditional networking with a new model of virtual infrastructure reimaging to eliminate single points of failure common in the traditional network currently in the cloud. The new model empowers the cloud with a cluster of network connections. This is different from application enabled virtualization. This is an expert mutative virtual infrastructure with built-in hardware redundancy. The network infrastructure has a self-diagnostic algorithm that enables the system to send out a reimaging initiative. The self-recovering happens during virtualized hardware failures or during distributed denial of service attacks on critical infrastructure.
Keywords :
cloud computing; computer network security; data visualisation; absorptive attributes; alternative cloud networking virtual infrastructure; built-in hardware redundancy; client organizations; cloud computing; cloud hardware re-imaging; critical infrastructure; distributed denial of service attacks; enterprise application architecture; expert mutative virtual infrastructure; full virtualization; mobile computing; network architecture; network optimization; network planning; resource sharing; self-diagnostic algorithm; self-recovering; service management; social networks; virtual network components; Cloud computing; reimaging; virtualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing and Convergence Technology (ICCCT), 2012 7th International Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4673-0894-6
Type :
conf
Filename :
6530401
Link To Document :
بازگشت