Next Article in Journal
Research Status and Development Trend of Wastewater Treatment Technology and Its Low Carbonization
Next Article in Special Issue
IoT-Based Cotton Plant Pest Detection and Smart-Response System
Previous Article in Journal
IWGAN: Anomaly Detection in Airport Based on Improved Wasserstein Generative Adversarial Network
Previous Article in Special Issue
Discovering Irregularities from Computer Networks by Topological Mapping
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cloud Computing Network Empowered by Modern Topological Invariants

1
Department of Computer Science, The Superior University, Lahore 54000, Pakistan
2
Department of Software Engineering, Superior University, Lahore 54000, Pakistan
3
Faculty of Computer and Information Systems, Islamic University Madinah, Madinah 42351, Saudi Arabia
4
Department of Computer Science & IT, University of Sargodha, Sargodha 40100, Pakistan
5
Faculty of Electronics, Telecommunications and Information Technology, “Gheorghe Asachi” Technical University, 700050 Iaşi, Romania
6
Greensoft Ltd., 700137 Iaşi, Romania
7
Department of Computers, Electronics and Automation, Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, 720229 Suceava, Romania
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(3), 1399; https://doi.org/10.3390/app13031399
Submission received: 12 November 2022 / Revised: 14 January 2023 / Accepted: 15 January 2023 / Published: 20 January 2023

Abstract

:
The cloud computing networks used in the IoT, and other themes of network architectures, can be investigated and improved by cheminformatics, which is a combination of chemistry, computer science, and mathematics. Cheminformatics involves graph theory and its tools. Any number that can be uniquely calculated by a graph is known as a graph invariant. In graph theory, networks are converted into graphs with workstations or routers or nodes as vertex and paths, or connections as edges. Many topological indices have been developed for the determination of the physical properties of networks involved in cloud computing. The study computed newly prepared topological invariants, K-Banhatti Sombor invariants (KBSO), Dharwad invariants, Quadratic-Contraharmonic invariants (QCI), and their reduced forms with other forms of cloud computing networks. These are used to explore and enhance their characteristics, such as scalability, efficiency, higher throughput, reduced latency, and best-fit topology. These attributes depend on the topology of the cloud, where different nodes, paths, and clouds are to be attached to achieve the best of the attributes mentioned before. The study only deals with a single parameter, which is a topology of the cloud network. The improvement of the topology improves the other characteristics as well, which is the main objective of this study. Its prime objective is to develop formulas so that it can check the topology and performance of certain cloud networks without doing or performing experiments, and also before developing them. The calculated results are valuable and helpful in understanding the deep physical behavior of the cloud’s networks. These results will also be useful for researchers to understand how these networks can be constructed and improved with different physical characteristics for enhanced versions.

1. Introduction

Cloud computing is the on-demand availability of workstation structure resources, especially data capacity limit (cloud limit) and computing power, without a direct unique organization by the client [1]. Gigantic clouds regularly have limits coursed over various regions, each region being a server ranch [2]. Cloud computing relies upon the sharing of resources to achieve clarity and regularly uses a “pay-all-the-more just as expenses emerge” model, which can help in diminishing capital expenses, yet may similarly provoke frightening working expenses for clueless clients [3]. It also means reducing costs by using the best characteristics cloud computing network as it expanded effectively. A model for conveying the Web-based utility registering administrations, cloud computing has swiftly emerged. The rapid expansion of the cloud computing industry with its wide range of clients, from small businesses to major corporations, has made it difficult for cloud service providers to manage the vast amount of data and other resources in the cloud. Ineffective asset management can taint cloud computing’s appearance. Therefore, resources should be distributed consistently to different partners without compromising the association’s benefit or the satisfaction of clients. One of the most significant and constantly evolving cloud computing paradigms is Infrastructure as a Service (IaaS). The scalability, administration style, greatest utility, lower costs, increased throughput, decreased idle time, the particular environment, cost viability, and a softer connection point are several examples of the core cloud computing components. Additionally, modern information-focused organizations have noticed a rapid increase in the asset requirements of contemporary apps. Energy efficiency; heterogeneity; load balancing; task scheduling; resource management; quality of service; workload management; the enormous volume of data; provision of affordable, simple, and flexible services; scalability; dynamic resource allocation; quality of service; optimum utility; decreased overheads; and higher throughput are just a few of the issues that need to be addressed, as well as a reduction in costs, which is among the problems and challenges with cloud computing, flexibility, capacity, scalability, and dependability [4,5,6,7,8,9]. All of these attributes depend on the cloud’s topology, which determines how different nodes, pathways, and clouds should be connected to maximize the previously described attributes or characteristics. The study only addresses the topology of the cloud network to achieve the best of all attributes and resolve all the issues and challenges to the possible extent with the help of topological invariants. The performance, efficiency, quality of service, security of cloud networks, flexibility, and cost-effectiveness are dependent on the topology of the cloud network to some extent. The study solves the cloud network topologically with the help of graph theory and cheminformatics, which is a combination of computer science, chemistry, and mathematics. The deduced results will be used for the scalability, modeling, capacity enhancement, and other challenges discussed above for cloud computing networks.
The review is likewise vital because of the vigorous nature of the issues regarding cloud computing. Therefore, the study discusses and resolves issues, such as scalability, higher throughput, reduced latency, efficient use, and adaptable cloud computing networks to fulfill the desired outcomes in the context of topology. For the formal reason, the study solves the existing cloud computing network with the help of certain freshly prepared topological invariants and gives the best-fit topology for the existing cloud computing network, and also gives the basis for the modeling of new scalable cloud computing networks with the best feasible characteristics [10].
On the other hand, a network’s dynamic development is intimately related to its arrangement of internal connections [11]. The lack of periodic patterns in the great majority of computer networks, particularly recurrent neural networks, makes it difficult to demonstrate this link from a theoretical and formal standpoint, leaving only descriptive statistical characteristics to explain network dynamics [12]. The algebraic topology gives us invariants, which are a great tool for understanding the structure of abstract spaces and can also be defined for graphs. The study proposes that these invariants be used in network science. A topological index is a quantity derived from a graph that reflects the relevant structural properties of the underlying network. It is, in reality, a numerical number associated with the network used to correlate computer structures with specific physical qualities. A topological index is created by converting a computer network into a numerical value. It is a numeric number associated with a computer structure (graph) that characterizes the structure’s topology and is invariant under a structure-preserving mapping. The study uses K-Banhatti Sombor (KBSO) invariants, Contraharmonic-Quadratic invariants (CQI), and Dharwad invariants for the solution of cloud computing networks [13].
Gutman defines the Sombor indices and their different forms. The vertex degree-based invariant graph, named the Sombor index, is utilized to catch the sharp lower and upper limits of the associated network and the attributes of the network arriving at the limits. There are two variations of KBSO indices, the first is the KBSO index and the second is its diminished adaptation means reduced form [14]. A KBSO index is a topological index that is a number related to a network graph that catches the symmetry of the network structure and gives a logical language to foresee the qualities of the network to enhance the cloud network topologically [15].
In 2021, VR Kulli presented some topological degree-based indices following Gutman’s Sombor indices. These indices are called Dharwad indices. It has a couple of different forms such as Dharwad, Dharwad reduced remarkability, and the δ-Dharwad index which is utilized to tackle the geography of sweet-smelling compounds called aromatic compounds. Quantitatively predicting the hidden aspects of various network constructions, such as cloud networks, bridge networks, Sierpinski networks, and chemical component networks used in the production of various networks utilized in different product development, is made possible by CQIs. Dharwad indices can be used to solve the topology of cloud networks as these are already used for aromatic compounds [1]. These indices are used to solve the topology of a cloud network very effectively and efficiently and to find the lower bounds and upper bounds of a cloud network or graph [16,17]. It can also be used for the verification, improvement, and exploration of irregularities from the network under discussion [18].

1.1. Research Motivation

The investigation of cloud computing networks’ topological invariants is the primary goal of this study. The study determines the seriousness and intensity of topological indices in particular cloud networks. The paper demonstrates the advantages of some topological invariants, such as KBSO, CQI, and Dharwad, as well as their reduced forms. Its main goal is to provide formulas that can be used to evaluate the topology and performance of certain cloud networks, both before they are manufactured, and without doing experiments. The research yielded mathematical conclusions that are used in the modeling of specific cloud networks.
Due to their incremental and quick character, it is also uncovering new and significant formulas or solutions for modeling and creating specific cloud networks, for which no acceptable solution has yet been identified.
The idea is to create new, highly effective cloud networks with the best features, while also enhancing the ones that already exist. This is because vendors and manufacturers require products that are reliable and effective. The study gives the ability to create the strongest, most reliable, and error-free specific networks.

1.2. Research Questions

Our research questions deal with the better cloud networks used in interconnection networks, parallel processing, power generation networks, bioinformatics, chemical compound development, and robotics. The study focuses on providing mathematical results for modeling purposes before the manufacturing of the above-mentioned products by avoiding compromised cloud networks.
The following questions arise from the said topic:
RQ1 How does the study solve the topology of the cloud networks involved in interconnection networks mathematically by graph theory?
RQ2 How does the study model the interconnection networks with the help of the deduced mathematical results?
RQ3 How did the study enhance the existing interconnection networks, reduce their irregularities, and find error-free, failure-free, and efficient advanced cloud networks as compared to existing networks?

2. Background and Literature Review

2.1. Background

Cloud computing is one of the most impressive creations that has received the interest of technologists from one side of the planet to the other. Cloud computing enjoys many benefits; however, it likewise has a large number of gambles in the context of security, scalability, latency delay, etc., which cannot be easily overlooked. For a fruitful cloud computing reception in an enterprise, legitimate preparation and familiarity with the arising chances, dangers, weaknesses, and potential arrangements are essential. Accordingly, deciding the best arrangement guidelines to increment cloud security has become significant for all cloud tasks. In this examination, we are exploring and surveying the most vital organization security and information security gambles on cloud frameworks because of a writing audit. Since numerous organizations have advanced and promoted virtual conditions as the answer to current security concerns, a more profound look finds that virtualization adds the product to the organization framework, which might impact security whenever inadequately constructed and conveyed [19,20,21]. In previous studies, cloud networks have some issues regarding security, latency delay, etc. These issues, along with some other issues, linger on in this research theme.

2.2. Literature Review

An analysis in light of the big data and cloud computing innovation is suggested for meeting the correspondence requirements of the photoelectric hybrid network design. The main focus of this study is the examination of big data and cloud computing innovation. To conduct this, it investigates specialized attributes, makes use of topological optical connections, sidesteps data structures and other techniques, and, in the end, develops an exploration methodology for big data and cloud computing. The results of the exploratory work indicate that loads of the optical connections are 60, 50, and 20, respectively. Hub B reaches the paths of the six objective nodes at the point where loads of optical connections start to become more modest. The photoelectric hybrid network structure makes it possible to communicate in more ways by using optical connections and controlling the scope of nearby connections. The challenges with the photoelectric hybrid network structure in communication can be examined in the context of cloud computing and big data innovation [22,23,24].
The overall reception of cloud server farms (CDCs) has brought about an omnipresent interest in facilitating application administrations on the cloud. Additionally, modern information-driven enterprises have noticed a rapid increase in the asset requirements of current apps. Due to this, more cloud servers have been made available, which has increased energy consumption and, as a result, raised supportability issues. The customary heuristics and the support of learning-based calculations for energy-efficient cloud assets help CEOs to partially overcome the challenges associated with adaptability and flexibility. The existing work frequently neglects to catch conditions across the warm attributes of hosts, asset utilization of undertakings, and the relating planning choices. This prompts the unfortunate adaptability and an expansion in the figure asset necessities, especially in conditions with non-fixed asset requests. To address these constraints, the man-made brainpower (AI)-based, all-encompassing, asset-the-board strategy for maintainable cloud computing called HUNTER has been proposed by S. Tuli and his team. The suggested model considers three important models—energy, warmth, and cooling—when planning the goal of increasing the energy efficiency in server farms as a multi-objective planning issue. As a replacement model, the tracker uses a gated graph convolutional network to generate the best planning decisions and approximate the Quality of Service (QoS) for a framework state. The probes reproduced, and actual cloud conditions utilizing the CloudSim tool stash and the COSCO system, show that HUNTER outflanks cutting-edge baselines as far as the energy utilization, SLA infringement, planning time, cost, and temperature by up to 12, 35, 43, 54, and 3 percent individually [25].
To modify the load in the context of cloud computing, this study presents a crossover meta-heuristic-based asset designation system called RAFL. The objective is to proactively reduce the heap lopsidedness among dynamic actual machines and in their asset limit-thinking (e.g., CPU and RAM). This avoids overloading or underloading dynamic physical machines and makes fair use of their asset limit consideration. In the proposed system, a phasor molecule swarm improvement and dragonfly calculation-based, half-breed streamlining calculation named PPSO-DA are utilized to create an ideal asset portion plan for adjusting the heap. Recreation tests are performed utilizing the CloudSim test system to quantify the measurements of burden unevenness across dynamic actual machines and among their thought about asset limits. Results show that the proposed PPSO-DA calculation beats the phasor molecule swarm streamlining, dragonfly calculation, exhaustive learning molecule swarm enhancement, memory-based half-breed dragonfly calculation, sine cosine calculation, and elephant grouping advancement in tracking down an ideal asset assignment for adjusting the heap. The measurable examination and benchmark testing likewise approve the general predominance of PPSO-DA [26].
The quick development of the cloud computing climate, with numerous clients going from individual clients to huge corporate or business houses, has turned into a test for cloud associations to deal with the gigantic volume of information and different assets in the cloud. The wasteful administration of assets can corrupt the exhibition of cloud computing. Consequently, assets should be uniformly distributed to various partners without compromising the association’s benefit as well as the clients’ fulfillment. Because the necessary assets are not available for free on the board, a client’s solicitation cannot be held indefinitely. To address these concerns, the RATS-HM technique, which combines asset distribution security with expert task planning for cloud computing, is proposed [27]. The following are the suggested RATS-HM procedures: The make range time is first limited, and the throughput is increased by a better feline multitude streamlining, calculation-based, short scheduler for task booking (ICS-TS). Second, a gathering improvement based on profound brain organization (GO-DNN) for the effective asset portion utilizing different plan requirements incorporates the data transfer capacity and asset load. Third, a lightweight confirmation conspires, i.e., SUPREME is proposed for information encryption to give security to the information capacity. At last, the proposed RATS-HM procedure is reproduced with an alternate recreation arrangement and the outcomes are contrasted with condition of-workmanship methods to demonstrate the viability. The outcomes regarding asset usage, energy utilization, reaction time, and so forth, show that the proposed strategy is better than the current one [28].
The review is additionally fundamental because of the dynamic assignment of assets lately; organizations have utilized the cloud computing worldview to run different computing and stockpiling responsibilities. The cloud offers a quicker and more beneficial administration. In any case, the issue of asset designation is difficult for cloud suppliers. The extreme utilization of assets has raised the requirements for better administration of them. What is more, the assets required may surpass those accessible in the cloud as the interests and limits differ after some time. Hence, dynamic asset designation procedures permit the utilization of the accessible limit all the more productively. The researchers give a functional dynamic resource allocation (DRA) to concentrate on a cloud computing climate. It represents the unique part of the cloud computing climate and how it is tended in the writing. Additionally, it gives the scientific categorizations of approaches, planning types, and streamlining measurements. Their study assists researchers in understanding the powerful part of asset distribution in the cloud, and consequently further developing its presentation [29].
Cloud computing is a plan of action where clients and suppliers are contending to sell and purchase administrations. Because of the assorted programming applications and the dynamic cloud market, clients’ prerequisites are truly evolving. Dynamic closeout-based asset portion models, or, to be specific, the combinatorial, twofold sale asset assignment (CDARA) model, stood out to the analysts. In the existing work, administrations are distributed to clients in light of less of a cost, which might prompt assistance level arrangement (SLA) infringements and increment the clients’ disappointment in the cloud commercial center. The choice of the single property cost might make certified and questionable suppliers take issue, as the suppliers will attempt to offer bad quality types of assistance. To settle these issues, they proposed a versatile, market-situated combinatorial twofold sale asset portion (AMO-CDARA) model that designates administrations to clients given different boundaries, such as less value, QoS, and supplier positioning. In the proposed model, offers are received by a salesperson from different suppliers and clients. The broker works out the client’s and supplier’s bid densities and distributes administrations to the most proficient clients from the most productive suppliers, as per their expected solicitation. After the fruitful running of undertakings, the barker requests criticism of the pre-owned administrations from clients and computes the last positioning of suppliers for future sales. The reproduction results show that the proposed model ensured SLA infringement up to almost 100% because of two times the discipline punishment and positioning of suppliers. The surefire QoS clients/representatives will give additional installment to that, and the additional installment will be from 1% to 10% of the absolute value, as per the last cost. Moreover, we tackled the bidder drop issue by up to 10% by expanding administration costs by adding QoS costs [30].
These days, cloud computing is pulled into wider consideration as it can convey IT administrations and assets on an interesting premise over the internet. Load balancing is a vital test in cloud computing. Because of the perplexing structure of cloud computing, it is troublesome and expensive to assess the way of behaving of load-balancing procedures on various cloud assets in light of the QoS boundaries in a genuine cloud climate. Subsequently, to beat what was going on, cloud computing devices are utilized for reproduction to test the way of behaving of load balancing strategies in the cloud framework under various circumstances in a rehashed way by changing different boundaries. Today, a variety of tools are available, including CloudSim, WorkflowSim, CloudSim4DWf, GreenCloud, and CloudAnalyst. Each tool has a different trademark, engineering, boundary, and outcome evaluation. Therefore, it is crucial to choose a capable, load-balancing device that complies with the QoS requirements. The researchers focus on important cloud load-balancing tools and provide a comparative analysis of the important, recently suggested, and existing load-balancing tools. In addition, they will look at load-balancing plans divided into three categories [31].
Giving wise task execution and responsible resource usage, however, is essential. Due to the nature of the administration, the executives’ assets, task planning, burden adjustment, and board duty, a few solutions have been considered in the writing to improve the execution and asset utilization. The ability of server farms to avoid overloading or underloading virtual machines, thanks to the load adjustment in the cloud, is in and of itself a test for cloud computing [32]. Engineers and scientists must, therefore, build and implement an appropriate load balancer for equal and distributed cloud situations. This study presents a cutting-edge survey of the issues and difficulties related to the existing burden-adjusting methods for specialists to foster more Efficient methods [33].

2.3. Expected Contributions

The following are the expected contributions of said research:
  • The expected contribution of this research is to analyze how existing cloud networks can be improved by optimizing their adaptability.
  • During the said research, certain cloud networks were modeled through deduced results by topological invariants. These results will be graphically developed over the solution of networks by freshly prepared topological indices.
  • Existing networks will be studied for topological perspectives, and the QSPR and QSAR models will be developed and analyzed.
  • The relation between the lower bounds and upper bounds of the network or graph will be discovered. Further, these relationships will be defined through optimization.
  • Cloud networks and other certain computer networks are solved and evaluated with the help of topological invariants.
  • The outcomes of the research will provide design guidelines for advanced cloud networks and their applications in interconnection networks.

2.4. Scope

The research work concentrates on the topological properties and solutions of cloud networks for interconnection networks, power generation networks, chemical compounds, robotics, etc., through topological invariants. The topological properties include lower bounds, upper bounds, and prediction qualities of deduced mathematical results. As cloud networks are modeled through these solved results, engineers and manufacturers foresee concerning products before manufacturing or developing them.

3. Research Methodology

This systematic study will take an existing cloud computing network and associate it with a graph and solve the topology of the graph with the help of the KBSO indices, QCI, Dharwad index, and their reduced forms. The concerning results in the form of formulas will compare with existing results. These deduced results will be used for the modeling and development of a best-fit network having the best feasible characteristics. This model is very concerning as it solved the topology of cloud computing networks in numeric and graphical form and gives accurate results. After the analysis, a simulation tool maple is used for the verification and validation of the results [34]. A ‘Cr,s’ is an existing cloud network that is under investigation, and the study finds vertices and edges of the given network, defines certain modern topological invariants KBSO, CQI, Dharwad, and their reduced forms, then converts the cloud network into the graph after mapping, afterward solving the mapped network graph through the given topological invariants, as mentioned in Figure 1. In the end, validation and optimization have been performed by ML-based mathematical tools. Mapping and the predicted graphical results based on proven mathematical results are portrayed with the help of the ML-based mathematical tool Maple. The Cr,s represents a graph of a cloud network, where ‘C’ is the name of the cloud graph, ‘r’ and ‘s’ are their parameters which represent the rth number of big clouds and the sth number of small clouds. As Figure 2 shows with one cloud network with one big cloud consisting of s number of times small clouds, the study generates results and equations for any number of small or large clouds.

4. Experimentation and Results

The ‘Cr,s’ cloud network was mapped, converted into the graph, solved, validated, and the results optimized according to the steps and methodology discussed in the methodology section, with the help of topological invariants mentioned in Equations (1)–(6).
KBSO G = ue     d u 2 + d ρ 2
KBSO r ρ d -   G = ue     ( d u 1 ) 2 + d ρ 1 2
Equations (1) and (2) show the KBSO index and its reduced form, which will be used for the solution of the cloud computing network. In the above equations, du and de are showing edge partitions, where ‘u’ and ‘e’ are the vertices of the graph Cr,s under discussion.
CQI G = uv E G     2 d G u 2 + d G v 2 d G u + d G v
QCI G = uv E G · d G u + d G v 2 d G u 2 + d G v 2
Equations (3) and (4) show the CQI and QCI, which will be used for the solution of the cloud computing network. In the above equations, du and dv are showing the edge partitions, where the vertices of the graph Cr,s are the ‘u’ and ‘v’ under discussion.
D G = ue     du 3 + dv 3
The cloud computing network is converted into graphical form first and then associated with the graph. The graph is solved through the KBSO index, CQI, Dharwad index, and their other forms.
RD   G = ue     du 1 3 + dv 1 3
Equations (5) and (6) show the Dharwad index and its reduced form will also be used for the solution of the cloud computing network. In the above equations, du and dv are showing the edge partitions where the vertices of the graph Cr,s are the ‘u’ and ‘v’ under discussion.
Table 1 describes the edge partitions of the graph of the cloud computing network Cr,s, as given in Figure 1. Where ‘ε’ represents the edge, the du and dv are showing the edge partitions, and ‘u’ and ‘v’ are the vertices of the graph Cr,s under discussion. Recurrence means the number of edges attached to a particular vertex, also called frequency. By dividing a graph’s collection of nodes into mutually exclusive groups, a cloud graph partition reduces the network to a smaller graph. The partitioned graph will have edges made up of the original graph edges that cross over into the groups. The partitioned graph may be more useful for analysis and problem-solving than the original if the total number of edges is lower than in the case of the original graph.

4.1. Main Results of Cloud Computing Graph

The graph Cr,s is obtained from the ‘Kr’ and ‘r’ duplicates of ‘Ks’ by distinguishing each vertex of ‘Kr’ with a vertex of one ‘Ks’. Here, we figure out the KBSO, CQI, and Dharwad invariants of the graph Cr,s, and infer their decreased and other topological structures from it. Graph Cr,s is portrayed in graph-wise vision in Figure 2, and cloud-wise vision and graph-wise vision in Figure 3 [35,36,37,38,39,40].
Figure 2 shows the cloud graph but Figure 3 shows the extraction of the cloud graph from one of the cloud computing networks.
Figure 3 shows a cloud computing network in which different clouds are involved, from which the extraction of the cloud graph is carried out. A bigger centralized cloud is represented by ‘Kr’ and a smaller cloud attached to a bigger one is represented by ‘Ks’.

4.1.1. Cloud Computing Graph

Let Cr,s = G be a graph of the cloud computing network with edge partitions mentioned in Table 1.

4.1.2. Theorem 1

Let Cr,s = G be a graph of the cloud computing network, then the KBSO and KBSOred indices are
              KBSO   ( G ) = 1 2 2 s 1 2 + 2 s 4 2   r s 1 s 2 + s 1 2 + r + 2 s 5 2 r s 1 + 1 2 r + s 2 2 + 2 r + 2 s 6 2   r s 1
            KBSO red   ( G ) = 1 2 s 2 2 + 2 s 5 2   r s 1 s 2 + s 2 2 + r + 2 s 6 2 r s 1 + r + s 2 2 2 r + 2 s 7 2   r s 1
Equations (7) and (8) represent the proven results of the graph of Cr,s of the cloud computing network mentioned in Figure 2. These are the proven results used for modeling the means scalability and reducing latency because these modeling results have the best characteristics for the development of enhanced cloud networks, with the help of the KBSO invariants.

4.1.3. Investigation of Cr,s of the Cloud Computing Network Graph by KBSO Indices

Proof. 
KBSO   ( G )   = ue     d u 2 + d ρ 2
                  KBSO   ( G )   = s 1 2 + 2 s 4 2 r s 1 s 2 2 + s 1 2 + r + 2 s 5 2 r s 1 + r + s 2 2 + 2 r + 2 s 6 2 r s 1 2                                           KBSO   ( G )   =   1 2 2 s 1 2 + 2 s 4 2   r s 1 s 2 + s 1 2 + r + 2 s 5 2   r s 1 + 1 2 r + s 2 2 + 2 r + 2 s 6 2   r s 1   KBSO   red   ( G )   = ue     d u 1 2 + d ρ 1 ² KBSO red   ( G )   = s 1 1 2 + 2 s 4 1 2   r s 1 s 2 2 + 5 s 1 1 2 + r + 2 s 5 1 2   r s 1 + 4 r + s 2 1 2 + 2 r + 2 s 6 1 2   r s 1 2 KBSO red   ( G )   = 1 2 s 2 2 + 2 s 5 2   r s 1 s 2 + s 2 2 + r + 2 s 6 2   r s 1 + r + s 2 2 + 2 r + 2 s 7 2   r s 1 .
Figure 4 shows the results (Equations (7) and (8)) of the KBSO and KBSOred invariants in the red and blue colors, respectively, in the 3D version, which shows the upper and lower bounds of a graph of the cloud network. These are not fully separated and do not show sharp bounds. There are also some irregularities present in the graph of the cloud network because the lower and upper bounds are not quite separate and straight lines. These irregularities can be found with the help of irregularity indices in future work.

4.1.4. Theorem 2

Let Cr,s = G be a graph of the cloud computing network, then the CQI and QCI indices are
CQI G = s 1 2   r s 1 s 2 2 s 2 + 2 s 1 2 + 2 r + s 2 2 2 s 3 + r   r s 1 + r + s 2 2 r s 1 2 r + 2 s 4
QCI G = 1 4   2 s 2 r s 1 s 2 s 1 2   + 2 s 3 + r r s 1 2 s 1 2 + 2 r + s 2 2   + 1 4 2 r + 2 s 4 r s 1 r + s 2 2  
Equations (9) and (10) represent the proven results of the graph of the cloud computing network mentioned in Figure 2. These are the results that have been validated and are utilized for modeling the methods that reduce latency. The results are validated because Theorem 2 is proven, and the graphical results also show quite sharp upper and lower bounds of the graph of the cloud network by the CQI and QCI. So, these modeling outcomes exhibit the best qualities for the creation of improved cloud networks using the CQI invariants.
CQI G = uv E G     2 d G u 2 + d G v 2 d G u + d G v
CQI G = 2 s 1 2 + s 1 2 s 1 + s 1   r s 1 s 2 2 + 2 s 1 2 + r + s 2 2 s 1 + r + s 2   r s 1 + 2 r + s 2 2 + r + s 2 2 r + s 2 + r + s 2 r s 1 2
CQI G = s 1 2   r s 1 s 2 2 s 2 + 2 s 1 2 + 2 r + s 2 2 2 s 3 + r   r s 1 + r + s 2 2 r s 1 2 r + 2 s 4
QCI   G = uv E G   d G u + d G v 2 d G u 2 + d G v 2  
QCI G = s 1 + s 1 2 s 1 2 + s 1 2 r s 1 s 2 2 + s 1 + r + s 2 2 s 1 2 + r + s 2 2 r s 1 + r + s 2 + r + s 2 2 r + s 2 2 + r + s 2 2 r s 1 2
QCI G = 1 4   2 s 2 r s 1 s 2 s 1 2   + 2 s 3 + r r s 1 2 s 1 2 + 2 r + s 2 2   + 1 4 2 r + 2 s 4 r s 1 r + s 2 2  
Figure 5 shows the results with clear upper and lower bounds Equations (9) and (10) of the CQI and QCI in red and blue colors, respectively, in the 3D version. As seen in Figure 5, the separation and straight line started from one to three for the ‘r’ and ‘s’ parameters. This would be used accordingly during the construction of cloud computing networks.

4.1.5. Theorem 3

Let Cr,s = G be a graph of the cloud computing network, then, the Dharwad and Dharwadred indices are
D   ( G )   = 1 2 2 s 1 3   r s 1 s 2 + s 1 3 + r + s 2 3   r s 1 + 1 2 2 r + s 2 3   r s 1
RD   ( G )   = 1 2 2 s 2 3   r s 1 s 2 + s 2 3 + r + s 2 3   r s 1 + 1 2 2 r + s 2 3   r s 1
Equations (11) and (12) represent the proven results of the Dharwad invariants of the graph of the cloud computing network mentioned in Figure 2.

4.1.6. Investigation of Cloud Computing Graph by Dharwad Indices

Proof. 
D G = ue     du 3 + dv 3
D ( G ) = s 1 3 + s 1 3   r s 1 s 2 2 + s 1 3 + r + s 2 3 r s 1 + r + s 2 3 + r + s 2 3   r s 1 2
D   ( G ) =   1 2 2 s 1 3   r s 1 s 2 + s 1 3 + r + s 2 3   r s 1 + 1 2 2 r + s 2 3   r s 1
RD   G = ue     du 1 3 + dv 1 3  
RD   ( G ) = s 1 1 3 + s 1 1 3   r s 1 s 2 2 + s 1 1 3 + r + s 2 1 3   r s 1 + r + s 2 1 3 + r + s 2 1 3   r s 1 2
RD   ( G )   =   1 2 2 s 2 3   r s 1 s 2 + s 2 3 + r + s 2 3   r s 1 + 1 2 2 r + s 2 3   r s 1 .
Figure 6 shows the results Equations (9) and (10) of the Dharwad and Dharwadred in the red and blue colors, respectively, in the 3D version, which shows the sharp upper and lowers bounds of a cloud network. It is quite a straight line for high values of parameters ‘r’ and ‘s’, which means that a large number of clouds can be attached for the best characteristics.

4.2. Discussion

According to the aforementioned findings, topological invariants, such as K-Banhatti Sombor invariants, Contraharmonic-Quadratic invariants, Dharwad invariants, and their reduced forms, allow us to gather information about cloud networks in the form of algebraic structures and provide us with a mathematical technique to infer the hidden properties of various structures, such as the particular networks. The degree-based topological indices and the distance-based topological indices are the two primary classes of topological indices that clash, but in the present study, the networks were solved using the degree-based topological indices, and the best results are displayed in the graphs. Through the application of topological invariants, the research focuses on the topological characteristics and solutions of cloud networks for interconnection networks used on the internet, power-generating networks, chemical compounds, robotics, etc. The lower bounds, higher bounds, and the ability to predict the outcomes of the derived mathematical operations are among the topological traits. Although these solved solutions serve to model interconnection networks, engineers and product developers anticipate issues with items before creating or developing them. The efficiency, load balancing, and latency delay are also dependent on the topology of the network [41,42]. This is the reason why the study solved the topology of a cloud network. The deduced mathematical results are used for the construction of the new, best characteristic cloud networks, including efficiency, load balancing, and less latency delay.
In answer to the expected contribution, the study provides the mathematical results for the modeling of the cloud networks, developed the model in the Methodology section, and provided the graphical predicted results and the lower and upper bounds of the cloud graph. Equations (7)–(12) are the mathematical solutions of the cloud networks, with the help of topological invariants and graphical and mathematical results, providing the guidelines for the network engineers and architectural engineers during the modeling of the cloud network and all other networks in which the cloud network is used, and also during actual constructions of these networks.

5. Conclusions

TIs have lots of uses and implementations in many fields, including computer science, chemistry, biology, informatics, arithmetic, material sciences, and many more, and especially in cloud networks and other network architectures. However, the application with the utmost significant is in the non-exact QSPR and QSAR. TIs are associated with the structure of cloud networks used in cloud computing. The study discusses the KBSO invariants, CQIs, and Dharwad invariants and their reduced forms, which are freshly presented and have numerous prediction qualities for different variants of cloud computing networks for improvements in the context of scalability, efficiency, higher throughput, best-fit topology, and latency in context to their topology. The study achieves improvements in all the mentioned characteristics through the best-fit topology of the cloud network. For this purpose, the study solves the existing network by converting it into a graph through topological invariants and gets the solution in mathematical and graphical form. The graphical results show the irregularities in cloud networks as mentioned by the KBSO, CQI, and its reduced forms. Equations (7)–(12) are the mathematical solutions of the cloud networks, with the help of topological invariants, and they provide modeling tools and instructions for network engineers. The study established the model and provided the anticipated results and lower and upper bounds graphically.

6. Future Work

Future work is to deal with these irregularities. Mathematically deduced results from Equations (3)–(5) will be used for the modeling and improvements of cloud networks used in cloud computing, as well as in different chemical structure developments with the best characteristics.

Author Contributions

Conceptualization, K.H.; Methodology, K.H. and M.W.I.; Formal analysis, K.H. and A.B.; Investigation, O.G.; Resources, M.A. and O.G.; Data curation, M.W.I. and A.B.; Writing—original draft, K.H.; Writing—review & editing, M.W.I.; Supervision, M.W.I. and M.A.; Project administration, O.G.; Funding acquisition, Q.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funding supported by the Programme: SME Growth Romania–Priority ICT, Contract Greensoft No. 2020/548467, Project name: AI FERODATA.

Acknowledgments

We thank our parents, supervisor, and family who provided us with moral support.

Conflicts of Interest

No conflict related to the concept and procedure of study between authors.

References

  1. Ray, P.P. An introduction to dew computing: Definition, concept and implications. IEEE Access 2018, 6, 723–737. [Google Scholar] [CrossRef]
  2. Montazerolghaem, A.; Yaghmaee, M.H.; Leon-Garcia, A. Green cloud multimedia networking: NFV/SDN based energy-efficient resource allocation. IEEE Trans. Green Commun. Netw. 2020, 4, 873–889. [Google Scholar] [CrossRef]
  3. Qian, L.; Luo, Z.; Du, Y.; Guo, L. Cloud computing: An overview. In Cloud Computing; Springer: Berlin/Heidelberg, Germany, 2009; pp. 626–631. [Google Scholar]
  4. Khan, A.W.; Khan, M.U.; Khan, J.A.; Ahmad, A.; Khan, K.; Zamir, M.; Kim, W.; Ijaz, M.F. Analyzing and evaluating critical challenges and practices for software vendor organizations to secure big data on cloud computing: An AHP-based systematic approach. IEEE Access 2021, 9, 107309–107332. [Google Scholar] [CrossRef]
  5. Sasubilli, M.K.; Venkateswarlu, R. Cloud computing security challenges, threats and vulnerabilities. In Proceedings of the 2021 6th International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 20–22 January 2021; pp. 476–480. [Google Scholar]
  6. Ahmad, W.; Javed, A.R.A.R.; Baker, T.; Jalil, Z. Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics 2022, 11, 16. [Google Scholar] [CrossRef]
  7. Lin, Z.; Zou, J.; Liu, S.; Peng, C.; Li, Z.; Wan, X.; Fang, D.; Yin, J.; Gobbo, G.; Chen, Y.; et al. A cloud computing platform for scalable relative and absolute binding free energy predictions: New opportunities and challenges for drug discovery. J. Chem. Inf. Model. 2021, 61, 2720–2732. [Google Scholar] [CrossRef] [PubMed]
  8. Alouffi, B.; Hasnain, M.; Alharbi, A.; Alosaimi, W.; Alyami, H.; Ayaz, M. A systematic literature review on cloud computing security: Threats and mitigation strategies. IEEE Access 2021, 9, 57792–57807. [Google Scholar] [CrossRef]
  9. Yahia, H. Comprehensive survey for cloud computing based nature-inspired algorithms optimization scheduling. Asian J. Comput. Sci. Inf. Technol. 2021, 8, 1–16. [Google Scholar] [CrossRef]
  10. Mekawie, N.; Yehia, K. Challenges of deploying cloud computing in ehealth. Procedia Comput. Sci. 2021, 181, 1049–1057. [Google Scholar] [CrossRef]
  11. Abubakar, H.; Hashim, N.; Hussain, A. Usability evaluation model for mobile banking applications interface: Model evaluation process using experts’ panel. J. Telecommun. Electron. Comput. Eng. 2016, 8, 53–57. [Google Scholar]
  12. Hussain, Z.; Munir, M.; Rafique, S.; Kang, S.M. Topological characterizations and index-analysis of new degree-based descriptors of honeycomb networks. Symmetry 2018, 10, 478. [Google Scholar] [CrossRef] [Green Version]
  13. Liu, J.-B.; Peng, X.-B.; Hayat, S. Topological index analysis of a class of networks analogous to alicyclic hydrocarbons and their derivatives. Int. J. Quantum Chem. 2022, 122, e26827. [Google Scholar] [CrossRef]
  14. Gutman, I. Some basic properties of Sombor indices. Open J. Discret. Appl. Math. 2021, 4, 1–13. [Google Scholar] [CrossRef]
  15. Khalid, H.; Iqbal, M.W.; Virk, A.U.R.; Ashraf, M.U.; Alghamdi, A.M.; Bahaddad, A.A.; Almarhabi, K.A. K-Banhatti sombor invariants of certain computer networks. Comput. Mater. Contin. 2022, 73, 15–31. [Google Scholar]
  16. Kulli, V.R. Dharwad index. Int. J. Eng. Sci. Res. Technol. 2021, 10, 17–21. [Google Scholar]
  17. Havare, Ö.Ç. Quantitative structure analysis of some molecules in drugs used in the treatment of covid-19 with topological indices. Polycycl. Aromat. Compd. 2021, 1, 1–12. [Google Scholar] [CrossRef]
  18. Mitic, V.V. Graph theory applied to microelectronics intergranular relations. Ferroelectrics 2021, 570, 145–152. [Google Scholar] [CrossRef]
  19. El Kafhali, S.; El Mir, I.; Hanini, M. Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing. Arch. Computat. Methods Eng. 2022, 29, 223–246. [Google Scholar] [CrossRef]
  20. Khalid, R.; Khaliq, K.; Tariq, M.I.; Tayyaba, S.; Jaffar, M.A.; Arif, M. Cloud computing security challenges and their solutions. In Security and Privacy Trends in Cloud Computing and Big Data; CRC Press: Boca Raton, FL, USA, 2022; pp. 103–118. [Google Scholar]
  21. Tariq, M.I.; Tayyaba, S.; Jaffar, M.A.; Ashraf, M.W.; Butt, S.A.; Arif, M. Information security framework for cloud and virtualization security. In Security and Privacy Trends in Cloud Computing and Big Data; CRC Press: Boca Raton, FL, USA, 2022; pp. 1–18. [Google Scholar]
  22. Wei, H. Optical hybrid network structure based on cloud computing and big data technology. J. Sens. 2022, 1, e3936876. [Google Scholar] [CrossRef]
  23. Palos-Sanchez, P.R.; Arenas-Marquez, F.J.; Aguayo-Camacho, M. Cloud computing (saas) adoption as a strategic technology: Results of an empirical study. Mob. Inf. Syst. 2017, 2017, e2536040. [Google Scholar] [CrossRef] [Green Version]
  24. Khan, T.; Tian, W.; Zhou, G.; Ilager, S.; Gong, M.; Buyya, R. Machine learning (ML)-centric resource management in cloud computing: A review and future directions. J. Netw. Comput. Appl. 2022, 204, 103405. [Google Scholar] [CrossRef]
  25. Tuli, S.; Gill, S.S.; Xu, M.; Garraghan, P.; Bahsoon, R.; Rana, O.; Buyya, R.; Casale, G.; Jennings, N.R. HUNTER: AI based holistic resource management for sustainable cloud computing. J. Syst. Softw. 2022, 184, 111124. [Google Scholar] [CrossRef]
  26. Thakur, A.; Goraya, M.S. RAFL: A hybrid metaheuristic based resource allocation framework for load balancing in cloud computing environment. Simul. Model. Pract. Theory 2022, 116, 102485. [Google Scholar] [CrossRef]
  27. Iqbal, M.; Ahmad, N.; Shahzad, S.K. Usability evaluation of adaptive features in smartphones. In Proceedings of the International Conference on Knowledge Based and Intelligent Information and Engineering Systems, KES2017, Marseille, France, 6–8 September 2017; pp. 2185–2194. [Google Scholar]
  28. Bal, P.K.; Mohapatra, S.K.; Das, T.K.; Srinivasan, K.; Hu, Y.C. A joint resource allocation, security with efficient task scheduling in cloud computing using hybrid machine learning techniques. Sensors 2022, 22, 1242. [Google Scholar] [CrossRef] [PubMed]
  29. Belgacem, A. Dynamic resource allocation in cloud computing: Analysis and taxonomies. Computing 2022, 104, 681–710. [Google Scholar] [CrossRef]
  30. Umer, A.; Nazir, B.; Ahmad, Z. Adaptive market-oriented combinatorial double auction resource allocation model in cloud computing. J. Supercomputing. 2022, 78, 1244–1286. [Google Scholar] [CrossRef]
  31. Haris, M.; Khan, R.Z. A systematic review on load balancing tools and techniques in cloud computing. In Inventive Systems and Control; Springer: Singapore, 2022; pp. 503–521. [Google Scholar]
  32. Nazir, J.; Iqbal, M.W.; Alyas, T.; Hamid, M.; Saleem, M.; Malik, S.; Tabassum, N. Load balncing framework for cross-region tasks in cloud computing. Comput. Mater. Contin. 2022, 70, 1479–1490. [Google Scholar]
  33. Kumar, P.; Kumar, R. Issues and challenges of load balancing techniques in cloud computing: A survey. ACM Comput. Surv. 2019, 51, 1–35. [Google Scholar] [CrossRef]
  34. Arif, M.; Wang, G. Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Netw. Distrib. Syst. 2020, 24, 143–166. [Google Scholar] [CrossRef]
  35. Hamid, K.; Iqbal, M.W.; Arif, E.; Mahmood, Y.; Khan, A.S.; Kama, N.; Azmi, A.; Ikram, A. K-Banhatti invariants empowered topological investigation of bridge networks. Comput. Mater. Contin. 2022, 73, 5423–5440. [Google Scholar] [CrossRef]
  36. Sadeghieh, A.; Ghanbari, N.; Alikhani, S. Computation of gutman index of some cactus chains. Electron. J. Graph Theory Appl. 2018, 6, 138. [Google Scholar] [CrossRef] [Green Version]
  37. Hamid, K.; Iqbal, M.W.; Ashraf, M.U.; Gardezi, A.A.; Ahmad, S.; Alqahtani, M.; Shafiq, M. Intelligent systems and photovoltaic cells empowered topologically by sudoku networks. Comput. Mater. Contin. 2023, 74, 4221–4238. [Google Scholar] [CrossRef]
  38. Alghamdi, A.M.; Hamid, K.; Iqbal, M.W.; Ashraf, M.U.; Alshahrani, A.; Alshamrani, A. Topological evaluation of certain computer networks by contraharmonic-quadratic indices. Comput. Mater. Contin. 2023, 74, 3795–3810. [Google Scholar] [CrossRef]
  39. Khalid, H.; Iqbal, M.W.; Muhammad, H.A.B.; Bhatti, S. Topological analysis empowered bridge network variants by dharwad indices. Online Open Access 2022, 41, 53–67. [Google Scholar]
  40. Hamid, K.; Iqbal, M.W.; Abbas, Q.; Arif, M.; Brezulianu, A.; Geman, O. Discovering Irregularities from Computer Networks by Topological Mapping. Appl. Sci. 2022, 12, 12051. [Google Scholar] [CrossRef]
  41. Arshed, J.U.; Ahmed, M.; Muhammad, T.; Afzal, M.; Arif, M.; Bazezew, B. GA-IRACE: Genetic Algorithm-Based Improved Resource Aware Cost-Efficient Scheduler for Cloud Fog Computing Environment. Wirel. Commun. Mob. Comput. 2022, 2022, 6355192. [Google Scholar] [CrossRef]
  42. Li, C.; Zhang, J.; Luo, Y. Real-time scheduling based on optimized topology and communication traffic in distributed real-time computation platform of storm. J. Netw. Comput. Appl. 2017, 87, 100–115. [Google Scholar] [CrossRef]
Figure 1. Methodology flow diagram.
Figure 1. Methodology flow diagram.
Applsci 13 01399 g001
Figure 2. Cloud network graph Cr,s.
Figure 2. Cloud network graph Cr,s.
Applsci 13 01399 g002
Figure 3. A cloud graph is extracted from a piece of a cloud computing network.
Figure 3. A cloud graph is extracted from a piece of a cloud computing network.
Applsci 13 01399 g003
Figure 4. Results of KBSO and KBSOred invariants for cloud computing network.
Figure 4. Results of KBSO and KBSOred invariants for cloud computing network.
Applsci 13 01399 g004
Figure 5. CQI and QCI for cloud network.
Figure 5. CQI and QCI for cloud network.
Applsci 13 01399 g005
Figure 6. Dharwad and Dharwadred invariants for cloud network.
Figure 6. Dharwad and Dharwadred invariants for cloud network.
Applsci 13 01399 g006
Table 1. Edge partition of the cloud network.
Table 1. Edge partition of the cloud network.
Εε (du, dv)Deε(du, de)Recurrence
ε1ε(s – 1, s – 1)2s – 4ε(s – 1, 2s – 4)(r(s – 1)(s – 2))/2
ε2ε(s – 1, r + s – 2)r + 2s – 5ε(s – 1, r + 2s – 5)r(s – 1)
ε3ε(r + s – 2, r + s – 2)2r + 2s – 6ε(r + s−2, 2r + 2s – 6)R(s – 1)/2
de = du + dv − 2.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hamid, K.; Iqbal, M.W.; Abbas, Q.; Arif, M.; Brezulianu, A.; Geman, O. Cloud Computing Network Empowered by Modern Topological Invariants. Appl. Sci. 2023, 13, 1399. https://doi.org/10.3390/app13031399

AMA Style

Hamid K, Iqbal MW, Abbas Q, Arif M, Brezulianu A, Geman O. Cloud Computing Network Empowered by Modern Topological Invariants. Applied Sciences. 2023; 13(3):1399. https://doi.org/10.3390/app13031399

Chicago/Turabian Style

Hamid, Khalid, Muhammad Waseem Iqbal, Qaiser Abbas, Muhammad Arif, Adrian Brezulianu, and Oana Geman. 2023. "Cloud Computing Network Empowered by Modern Topological Invariants" Applied Sciences 13, no. 3: 1399. https://doi.org/10.3390/app13031399

APA Style

Hamid, K., Iqbal, M. W., Abbas, Q., Arif, M., Brezulianu, A., & Geman, O. (2023). Cloud Computing Network Empowered by Modern Topological Invariants. Applied Sciences, 13(3), 1399. https://doi.org/10.3390/app13031399

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop