You are previewing Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing.
O'Reilly logo
Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing

Book Description

Like electricity and water, data and computing power are necessary commodities in the modern-day economy. A model for the effective regulation and provisioning of computational services will follow a similar paradigm as the existent model for traditional utilities. Emerging Research Surrounding Power Consumption and Performance Issues in Utility Computing explores methods of treating computing resources and materials as a standard utility, charging customers based on their usage and promoting competition among service providers. Including both benefits and hindrances, as well as theoretical concepts and practical considerations, this book provides an in-depth discussion of the utility computing paradigm for computer engineers, service providers, consumers, and academics in the field of computer science. This book includes emerging research on subjects including, but not limited to, Graphical Processing Unit (GPU) architectures, green computing, VMware, and device manufacturing techniques.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Preface
    1. INTRODUCTION
    2. ORGANIZATION OF THE BOOK
  6. Chapter 1: Utility Computing and Its Utilization
    1. ABSTRACT
    2. INTRODUCTION
    3. CLOUD COMPUTING
    4. CHARACTERISTICS OF CLOUD COMPUTING
    5. SERVICE MODELS OF CLOUD COMPUTING
    6. DEPLOYMENT MODELS
    7. ARCHITECHTURE OF CLOUD COMPUTING
    8. CLOUD COMPUTING PARADIGM
    9. UTILITY COMPUTING
    10. WEB SERVICE AND UTILITY MODEL ARCHITECTURE
    11. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  7. Chapter 2: Optimization and Management of Resource in Utility Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. RESOURCE MANAGEMENT IN UTILITY COMPUTING
    4. IMPLEMENTATION RESOURCE MANAGEMENT IN UTILITY COMPUTING
    5. PROVISIONING FOR RESOURCE ELEMENTS
    6. ADOPTION AND ALLOCATION FOR RESOURCES IN UTILITY COMPUTING
    7. MANAGEMENT FOR DISTRIBUTED RESOURCES
    8. ANALYSIS FOR RESOURCE OPTIMIZATION ALGORITHMS
    9. CONCLUSION
    10. REFERENCES
    11. ADDITIONAL READING
    12. KEY TERMS AND DEFINITIONS
  8. Chapter 3: Performance of Enterprise Architecture in Utility Computing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. REQUIREMENTS FOR UTILITY COMPUTING
    4. 3. RESOURCE PLANNING FOR UTILITY COMPUTING WITH GRID CONCEPT
    5. 4. VIRTUALIZATION IN UTILITY COMPUTING
    6. 5. ARCHITECTURE FOR UTILITY COMPUTING
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  9. Chapter 4: Green Computing and Its Impact
    1. ABSTRACT
    2. 1. GREEN COMPUTING: THE NEW PARADIGM
    3. 2. WHY GREEN COMPUTING?
    4. 3. HOLISTIC APPROACH OF GREEN COMPUTING
    5. 4. GREEN HARDWARE AND SOFTWARE TECHNIQUES
    6. 5. COMPUTING TECHNIQUES FOR GREEN COMPUTING
    7. 6. CHARACTERISTICS
    8. 7. IMPACTS OF GREEN COMPUTING
    9. 8. GREEN AWARENESS
    10. 9. ISSUES AND CHALLENGES AHEAD
    11. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  10. Chapter 5: Green Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. OVERVIEW OF GREEN COMPUTING
    4. WHAT IS “GREEN” IN GREEN COMPUTING?
    5. NEED FOR GREEN COMPUTING
    6. ACTIVITIES OF GREEN COMPUTING
    7. FIVE SIMPLE STEPS TO GREEN COMPUTING
    8. TOP 10 GREEN COMPUTING FEATURES
    9. APPROACHES TO GREEN COMPUTING
    10. ADVANTAGES OF GREEN COMPUTING
    11. GREEN COMPUTING: APPLICATIONS IN USE
    12. OVERVIEW OF CLOUD COMPUTING
    13. CLOUD ARCHITECTURE
    14. HOW CAN YOU USE THE CLOUD?
    15. FIVE KEY CHARACTERISTICS OF CLOUD COMPUTING
    16. SEVERAL FEATURES
    17. ADVANTAGES OF CLOUD COMPUTING
    18. OVERVIEW OF GREEN CLOUD COMPUTING
    19. REASONS OF GREEN
    20. GREEN CLOUD ARCHITECTURE
    21. FOUR REASONS WHY CLOUD COMPUTING IS ALSO A GREEN SOLUTION
    22. CASE STUDY: IaaS PROVIDER
    23. CONCLUSION
    24. REFERENCES
    25. ADDITIONAL READING
    26. KEY TERMS AND DEFINITIONS
  11. Chapter 6: History and Evolution of GPU Architecture
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. GPU EVOLUTION
    4. 3. NVIDIA GEFORCE GPU ARCHITECTURES
    5. 4. GPU SYSTEM ARCHITECTURES
    6. 5. VIRTUAL GPU TECHNOLOGY
    7. 6. PARALLEL COMPUTING MODELS
    8. 7. PARALLEL PROGRAMMING MODELS
    9. 8. APPLICATIONS OF GPU
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  12. Chapter 7: GPU Computation and Platforms
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. GPU COMPUTING APPLICATION AREAS
    4. 3. EVOLUTION OF GPU ARCHITECTURE
    5. 4. CHALLENGES IN GPU COMPUTNG
    6. 5. ADVANTAGES OF GPU COMPUTING
    7. 6. OBJECTIONS TO GPU COMPUTING
    8. 7. CUDA
    9. 8. OpenCL
    10. 9. OpenMPC
    11. 10. MPI
    12. 11. OpenAcc
    13. 12. DirectCompute
    14. 13. C++ AMP
    15. CONCLUSION
    16. REFERENCES
  13. Chapter 8: Advanced Topics GPU Programming and CUDA Architecture
    1. ABSTRACT
    2. INTRODUCTION
    3. CENTRAL PROCESSING UNIT (CPU)
    4. HISTORY OF GPU (GRAPHICAL PROCESSING UNIT)
    5. COMPARISON BETWEEN CPU AND GPU
    6. GRAPHICS CARD
    7. PHYSICAL COMPONENTS OF GRAPHICS CARD
    8. A GRAPHICS CARD IN AN IMAGE DISPLAY
    9. GRAPHICS CARD GRAPHICS PROCESSING UNIT
    10. CUDA
    11. MEMORY MODEL
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  14. Chapter 9: Designing of High Performance Multicore Processor with Improved Cache Configuration and Interconnect
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. ISSUES
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  15. Chapter 10: A Viability Analysis of an Economical Private Cloud Storage Solution Powered by Raspberry Pi in the NSA Era
    1. ABSTRACT
    2. INTRODUCTION
    3. VULNERABILITY OF DATA PRIVACY IN THE CLOUD
    4. RASPBERRY PI: IDEAL SIMPLE CLOUD SERVER
    5. OPEN SOURCE CLOUD STORAGE SOLUTIONS
    6. PERSONAL CLOUD DEPLOYMENT ON RASPBERRY PI
    7. SECURITY AND PRIVACY ANALYSIS
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  16. Chapter 11: Comparative Study on XEN, KVM, VSphere, and Hyper-V
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. HYPERVISORS
    4. CONCLUSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  17. Chapter 12: Security Aspects in Utility Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. THREAT AND VULNERABILITY ANALYSIS
    4. RISK ANALYSIS
    5. SECURITY ARCHITECTURE RECOMMENDATION IN UTILITY COMPUTING
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  18. Chapter 13: GPU Based Image Quality Assessment using Structural Similarity (SSIM) Index
    1. ABSTRACT
    2. INTRODUCTION
    3. CONCLUSION
    4. REFERENCES
  19. Chapter 14: A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPU
    1. ABSTRACT
    2. INTRODUCTION
    3. 1. CRYPTOGRAPHY
    4. 2. GENETIC ALGORITHMS
    5. 3. CUDA
    6. 4. LINEAR CONGRUENTIAL METHOD OF GENERATING PSEUDO RANDOM NUMBERS
    7. 5. PROPOSED APPROACH
    8. 6. RESULTS AND DISCUSSIONS
    9. 7. CONCLUSION
    10. REFERENCES
  20. Chapter 15: GPU Implementation of Friend Recommendation System using CUDA for Social Networking Services
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SOCIAL NETWORKING SERVICE
    4. 3. RECOMMENDATION SYSTEMS
    5. 4. CUDA
    6. 5. BREADTH-FIRST SEARCH (BFS)
    7. 6. RELATED WORK
    8. 7. ALGORITHM AND IMPLEMENTATION
    9. 8. EXPERIMENT AND ANALYSIS
    10. 9. CONCLUSION
    11. REFERENCES
  21. Chapter 16: Software Performance Estimate using Fuzzy Based Backpropagation Learning
    1. ABSTRACT
    2. INTRODUCTION
    3. FUZZY THEORY
    4. NEURAL NETWORK ARCHITECTURE
    5. NEURAL NETWORK TOPOLOGIES
    6. TRAINING OF ARTIFICIAL NEURAL NETWORKS
    7. GRADIENT DESCENT LEARNING
    8. BACKPROPOGATION LEARNING
    9. ADAPTIVE LEARNING ALGORITHMS
    10. PROPOSED METHODOLOGY
    11. FUZZY NEURON
    12. FUZZY BP ARCHITECTURE
    13. LEARNING
    14. INFERENCE
    15. ANALYSIS FOR SIMULATION
    16. CONCLUSION
    17. REFERENCES
    18. KEY TERMS AND DEFINITIONS
  22. Chapter 17: Content Based Image Retrieval System
    1. ABSTRACT
    2. INTRODUCTION
    3. CONTENT BASED IMAGE RETRIEVAL
    4. APPLICATIONS
    5. COLOR COHERENCE VECTOR
    6. SIMILARITY MEASURE
    7. AVERAGED NORMALIZED MODIFIED RETRIEVAL RANK
    8. LIMITATION OF EXISTING SYSTEM IN IMAGE SEARCHING
    9. PROPOSED SYSTEM
    10. ACTIVITY DIAGRAM
    11. CLASS DIAGRAM
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  23. Chapter 18: Dynamic Task Assignment with Load Balancing in Cloud Platform
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK
    4. PROBLEM DESCRIPTION
    5. PROPOSED METHODOLOGY
    6. SCHEDULING USINPSO WITH FIXED INERTIA (PSO-FI) AND VARIABLE INERTIA (PSO-VI)
    7. DYNAMIC TASK SCHEDULING U GENETIC ALGORITHM
    8. SIMULATION AND TEST BED
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  24. Chapter 19: Adaptive Mobile Architecture with Utility Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. ADVANTAGES OF UTILITY COMPUTING AS MODERN COMPUTING
    4. A TIERED ARCHITECTURE OF WEB APPLICATIONS
    5. ARCHITECTURAL ALTERNATIVES FOR UTILITY COMPUTING
    6. MOBILE CLOUD ARCHITECTURE USING UTILITY COMPUTING
    7. SCALABILITY CHALLENGE AND MOBILE PERFORMANCE
    8. MOBILE SECURITY CHALLENGE
    9. ENTERPRISE MOBILE SERVICE ARCHITECTURE
    10. ADAPTIVE ARCHITECTURE REQUIREMENTS
    11. ADVANTAGES AND DISADVANTAGES
    12. CONCLUSION
    13. REFERENCES
    14. ADDITIONAL READING
    15. KEY TERMS AND DEFINITIONS
  25. Chapter 20: Face Recognition
    1. ABSTRACT
    2. INTRODUCTION
    3. FACE RECOGNITION PROBLEM
    4. FACE DETECTION (FD)
    5. PROJECTION (PJ)
    6. SEARCH (S)
    7. IMPLEMENTATION
    8. CLOUD-BASED PERFORMANCE AUGMENTATION AND OTHER APPLICATIONS
    9. CONCLUSION AND FUTURE WORK
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  26. Compilation of References
  27. About the Contributors