Sunteți pe pagina 1din 20

ENERGY EFFICIENT

SCHEDULING OF SERVER
WITH MULTI-SLEEP MODES
FOR CLOUD DATA CENTER​
                                                           Batch no:11
                                              T. Tejaswini        16UK1A05K2
                                              M. Ajaykumar    16UK1A05L4
                                              MD. aslam         16UK1A05H9
.                                             D. Mani              16UK1A05H5
ABSTRACT :

Servers are always over-provisioned in an active state to meet the peak demand of requests,
wasting a large amount of energy.

One of the way to reduce the power consumption of data centers is to reduce the number of idle
servers, or to switch idle servers into low-power sleep states.

The sleep modes with smaller transition delays usually consume more power when sleeping this
can be done using State-of-the-art servers with multi-sleep modes. 
• THE ISSUE OF MINIMIZING ENERGY
CONSUMPTION OF A DATA CENTER BY
PROPOSED SCHEDULING SERVERS IN MULTI SLEEP MODES
AND AT DIFFERENT FREQUENCY LEVELS BY
SYSTEM : SATISFYING QOS REQUIREMENT.
THE SCHEDULING ALGORITHM WILL DETERMINE:

1) how many of the


2) how many of the
active servers should be 3) What frequency levels
sleeping servers in sleep
switched into which should the active servers
states should be woken
sleep state in each be set to in each timeslot.
up in each timeslot.
timeslot.
MODULES

DATA OWNER AUTHENTICATION END USER


CENTER
DATA OWNER

In this module, data owner has to


register to Authentication Center and Data owner browse the file, encrypt
Authentication Center checks and and upload file with its mac.
authorizes the data owner login. 

Once uploaded the file. All the


Data owner can also delete the file
authentication center must provide
after the uploading of the file to the
the storage access for the files tore
cloud. 
on the cloud. 
AUTHENTICATION CENTER

In this module Authentication Center check user & owner login and
authorizes the registration.

Authentication center list all other sub-authentication centers and provide


authorization (Activate OR Deactivate). 

Authentication center provides the storage access to cloud for every file
uploaded by the data owner.
END USER

In this module End user has to register  

User has to login 

the user is authorized by the authentication center 

user will request private key from the sub-authentication center1 

the secret key from the sub-authentication center2 to download the file from cloud server.
FEASIBILITY ANALYSIS :

Operational Feasibility

Economic Feasibility

Technical Feasibility
OPERATIONAL FEASIBILITY :

Operational Feasibility deals with the study of prospects of the system to be developed.

This system operationally eliminates all the tensions of the Admin and helps him in effectively
tracking the project progress.

This kind of automation will surely reduce the time and energy, which previously consumed in
manual work.

Based on the study, the system is proved to be operationally feasible.


ECONOMIC FEASIBILITY :

ECONOMIC FEASIBILITY OR COST-BENEFIT AS HARDWARE WAS INSTALLED FROM THE SINCE THE SYSTEM IS A NETWORK BASED,
IS AN ASSESSMENT OF THE ECONOMIC BEGINNING & FOR LOTS OF PURPOSES ANY NUMBER OF EMPLOYEES CONNECTED
JUSTIFICATION FOR A COMPUTER-BASED THUS THE COST ON PROJECT OF TO THE LAN WITHIN THAT ORGANIZATION
PROJECT. HARDWARE IS LOW. CAN USE THIS TOOL FROM AT ANY TIME. 
TECHNICAL FEASIBILITY :

The organization needs IBM


According to Roger S.
compatible machines with a
Pressman, Technical Feasibility
graphical web browser
is the assessment of the technical
connected to the Internet and
resources of the organization.
Intranet. 

Java Server Pages, JavaScript,


The system is developed for
HTML, SQL server and
platform Independent
WebLogic Server are used to
environment.
develop the system. 
INPUT DESIGN :

Input design is the process of converting the user created input into a computer-based
format.

The goal of the input design is to make the data entry logical and free from errors.

The error is in the input are controlled by the input design.

The application has been developed in user-friendly manner


OUTPUT DESIGN :

The Output from the computer is required to mainly create an efficient method of communication within the company
primarily among the project leader and his team members, in other words, the administrator and the clients.

The output of VPN is the system which allows the project leader to manage his clients in terms of creating new clients
and assigning new projects to them, maintaining a record of the project validity and providing folder level access to
each client on the user side depending on the projects allotted to him.
OUTPUT SCREEN SHOTS
DATA OWNER
AUTHENTICATION CENTER
END USER
CONCLUSION

The problem of scheduling of servers with multi-sleep modes for cloud data centers.

The servers can make transitions between one active state and different sleep states,
which involves different sleep power and transition delays for the sleep modes.
THANK YOU 

S-ar putea să vă placă și