2020
DOI: 10.17485/ijst/v13i13.211
|View full text |Cite
|
Sign up to set email alerts
|

Virtual machine optimization to achieve energy efficient optimum resource utilization in cloud data center

Abstract: Objectives: Cloud offers multiple benefits through its data center-based services. The whole world uses these services that are hosted by physical machines. Millions of virtual machines get an optimized utilization of hardware to utilize these physical machines. The unbalanced distribution of virtual machines to physical machines offers an inefficient utilization of data center hardware that will also lead to more carbon emission and harm the environment as well. Methods/material: A learning function is needed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…What is being attacked is usually not a specific vulnerability, but rather the very fact that the victim is connected to the network. Under normal operating conditions, and assuming that its link(s) and processing capacity have been adequately provisioned, the standard, TCP-like congestion control ensures fair use of the available resources (20)(21)(22) . Under a DDoS attack, the arriving packets do not obey end-to-end congestion control algorithms; instead, they incessantly bombard the victim, causing the well-behaved flows to back off and eventually starve.…”
Section: Ddos Attacksmentioning
confidence: 99%
“…What is being attacked is usually not a specific vulnerability, but rather the very fact that the victim is connected to the network. Under normal operating conditions, and assuming that its link(s) and processing capacity have been adequately provisioned, the standard, TCP-like congestion control ensures fair use of the available resources (20)(21)(22) . Under a DDoS attack, the arriving packets do not obey end-to-end congestion control algorithms; instead, they incessantly bombard the victim, causing the well-behaved flows to back off and eventually starve.…”
Section: Ddos Attacksmentioning
confidence: 99%