Department of Computer Science and Engineering
Permanent URI for this community
Department of Computer Science
Browse
Browsing Department of Computer Science and Engineering by Author "Abiona, Olatunde"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- ItemOpen AccessAn e-business grid model architecture for small and medium scale enterprises(2010-05) Bello, Sururah Apinke; Oluwatope, Ayodeji; Abiona, Olatunde; Sanni, Mistura; Onime, Clement E.; Eludiora, Safiriyu Ijiyemi; Aderounmu, Ganiyu A; Adagunodo, E. R.; Kehinde, L. O.In grid computing a loosely coupled and virtual computing infrastructure is created out of a collection of connected heterogeneous processors sharing various combinations of resources. It is pertinent to note that African Small and Medium Enterprises (SMEs) cannot participate in the global market using the current e-business solution due to the lack of or nonexistent infrastructure to support such services. In this paper, we propose a grid service based solution that is indigenous to African SMEs and technologically tailored to meet their local needs. The solution is based on an Application Service Provider (ASP) grid framework. The framework is specified using Universal Modeling Language (UML)
- ItemOpen AccessA Load Balancing Policy for Distributed Web Service(Scientific Research, 2010-01) Eludiora, Safiriyu Ijiyemi; Aderounmu, Ganiyu A.; Abiona, Olatunde; Oluwatope, Ayodeji; Onime, Clement E.; Kehinde, L. O.he proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distributed Web Servers (DWSs) provide an effective solution for improving the quality of web services. This paper addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having considered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, making it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java Development Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput.
- ItemOpen AccessA Load Balancing Policy for Distributed Web Service(International Journal of Communications, Network and System Sciences, 2010-01) Eludiora, Safiriyu; Abiona, Olatunde; Aderounmu, Ganiyu; Oluwatope, Ayodeji; Onime, Clement; Kehinde, LawrenceThe proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distrib-uted Web Servers (DWSs) provide an effective solution for improving the quality of web services. This pa-per addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having consid-ered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, mak-ing it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java De-velopment Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput
- ItemOpen AccessA User Identity Management Protocol for Cloud Computing Paradigm( International Journal of Communications, Network and System Sciences, 2011-01) Eludiora, Safiriyu Ijiyemi; Oluwatope, Ayodeji; Abiona, Olatunde; Oluwaranti, AdeniranCloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.