Using Cloud Computing in Supporting the Management of Travel Agencies

The Cloud has become a new vehicle for delivering resources such as computing and storage to Customers on demand. Rather than being a new technology in itself, the cloud is a new business model wrapped around new technologies such as server virtualization that take advantage of economies of scale and multi-tenancy to reduce the cost of using information technology resources. Rapid development particularly in the field of information technology and the rise of cloud computing of various types widely enables for exchanging data in a more convenient method for the needs of the clients in sectors that operate in the same field, which utilize same work methodologies. This paper aims at shedding light on the importance of using cloud computing in creating a kind of integrity between “Local and International Tourism Agencies” by transforming a given data format to another software on a cloud provider. The concept will be applied on a number of local agencies in Egypt. Using c# with SQL Database for building a model for interaction and data exchange between the" local and international agencies"


Introduction
''Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction'' 1 [NIST] During the past few years, there has been an evident shift in the world of computers and internet functions from the ordinary users' computers to remote servers that form a cloud of data and data processing. The idea of cloud computing has transferred the traditional concept of data creation and transmission into gates that enable viewing and modifying data that are held under the control of cloud service providers such as Amazon, Windows Azure, IBM , [1], [2], [3] An example of cloud is Google Drive service. , It allows users to create and edit documents online while collaborating with other users live. All files created with the apps are by default saved to Google Drive.
Data storage of files was introduced on January 12, 2010, with 1 GB of free space. On April 24, 2012, Google launched Google Drive which supplants Google Docs [4]

Modules of Clouds
Software as a Service: The clients use the cloud network to run a specific computer application, but do not control the infrastructure that runs the application.
A popular example is Google Docs, in which users can build spreadsheets or create documents using Google's software and remote storage space. Face book operates similarly, allowing customers to post photos, messages, through a website; it allows a user to use the provider's application hosted by the cloud vendor on pay-per-use basis. [5] Platform as a Service: In these module clients uses the cloud network to create and deliver new electronic applications but does not control the cloud's infrastructure.
One famous example is Microsoft Azure, which allows users to build and modify applications and then distribute them to customers. The city of Miami used Azure to build a map tracking information about 2 potholes, missed garbage collection, and illegal trash dumping [6].
Infrastructure as a Service: using this module provide the customers to buy new hardware from a infrastructure service provider.
For example, if a clothing store needs additional computing power for its website during the holiday shopping 324 Using Cloud Computing in Supporting the Management of Travel Agencies season, it could buy cloud space from companies like Rackspace that provide direct access to cloud infrastructure without buying new hardware. [7] Similarly, NASA also rented computer power from Amazon to process information received from the Mars rovers.

Virtualizations
Virtualization is a critical piece of the cloud without it, you cannot realistically provide rapid, flexbility, self-service delivery of services or a collection of consolidated shared resources By isolating services and machines from hardware [8] The main aim of virtualization technologies is to hide the physical characteristics of computing resources from the way in which other systems, applications, or end users interact with those resources, It possible for an IT Department to build a library of reusable resources that can be available to the business for building a private cloud [14].

A virtualization layer (Hypervisor)
Using VM [9] provides the required infrastructural support and making use of lower-level hardware resources in order to create multiple independent virtual machines that are isolated from each other.
This layer, traditionally Hypervisor, usually sits on top of the hardware and below the operating system.
Hypervisor is a program based on abstractions lying between a real machine and an emulator; in this case a virtual machine is an environment created and managed by a VMM manger. [10] The Virtual Machine (VM) concept [11] dates back to the 1960s; it was introduced by IBM as a mean to provide concurrent, interactive access to their mainframe computers. A VM was an instance of the physical machine and gave users the illusion of accessing the physical machine directly.
VMM is in charge of managing one or more VMs, and each VM in turn provides facilities to an OS or application as if it is run in a normal environment, directly on the hardware. Examples include VMware [12], Xen [13], [14], [15], Intel[16]

Clustering
Clustering allows multiple systems to function as one large system by using software and networking technologies such as shared file systems, high-speed interconnects (for servers), and similar technology. This, in turn, helps users to scale out their applications easily by adding more systems to an existing cluster to overcome the limits of physical resources (CPU and memory) in a single server. It also makes the applications highly available by allowing them to run on multiple servers in an active-active fashion to avoid single points of failure [17,18] 2.2.1. Architecture of System Virtualization A generic architecture of system virtualization, implemented in these systems, is given in Fig. 1.
The access to CPU resource is native, to all VMs sharing the CPU, for all instructions except the privileged instructions. The privileged instructions are virtualized, i.e., the DISK are treated differently, when virtualized. There are two different, popularly adopted, methods used for vitalizing I/O devices, namely, para-virtualization and emulation [19].
Both these modes provide data protection and integrity to independent VMs but suffer from loss of performance and usable device bandwidth. [20].

Multi-core Processor
Processors were originally developed with only one core. Multi-core processors were developed in the early 2000s by Intel, AMD and others.
Multi-core processors are widely used across many application domains including general-purpose, embedded, network, digital signal processing (DSP), and graphics. a single computing component with two or more independent actual central processing units (called "cores"), the multiple cores can run multiple instructions at the same time, increasing overall speed for programs amenable to parallel computing.
[21], [22] The improvement in performance gained by the use of a multi-core processor depends very much on the software algorithms used and their implementation. In particular, possible gains are limited by the fraction of the software that can be run in parallel.

Storage
The capacity of hard drives has grown exponentially over time. With early personal computers, a drive with a 20 megabyte capacity was considered large. In the latter half of the 1990s, hard drives with capacities of 1 gigabyte and [22] greater became available. As of 2006, the "smallest" desktop hard disk still in production has a capacity of 40 gigabytes, while the largest-capacity internal drives are a 3/4 terabyte (750 gigabytes), with external drives at or exceeding one terabyte by using multiple internal disks. These new internal drives increased their storage capacities with Perpendicular recording.

Communication
Bandwidth describes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps, (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth. Hybrid cloud: a cloud that is setup using a mixture of the above three deployment models. Each cloud in a hybrid cloud could be independently managed but applications and data would be allowed to move across the hybrid cloud. Hybrid clouds allow cloud bursting to take place, which is where a private cloud can burst-out to a public cloud when it requires more resources.

Problem Identification
It is well-acquainted with in travel agencies of medium and big tourism operation that they deal with the foreign tour operators by what is called "Agency File", it encompasses all that is related to the market contracted upon.
One tourism market may have more than one file for instance regarding the French market there is a file for tour operator located in a city and another file in another city, in addition regarding the German market there is a file for tour operator located in one city and another. Accordingly, one local company has the chance of dealing with numerous foreign tour operators, hence arises a difficulty in executing the work requirements for each file individually which necessitates time, effort and numbers of staff; the more the number of foreign files are, the more numbers of executives and computer sets used ,this in turn entails more time and financial load.
In figure 2 which illustrate the work Operation as hereinabove explained.
It is shows that company (x) deal with a number of agents, each agent has its own program; reservation, type of hotel, children policy…etc.
This program is based on the period of stay and excursions. Which enter the tourism programs into the system.
Suppose that there is a given tour operator that sends about 3.000 guests per week, if this number is handled by 5 persons; they handle these 3.000 including accommodation arrangements, type of program, excursions…etc, starting with the initial reservation, then the additions and deletions sent as updates by the foreign tour operators until the final reservations are actually materialized i.e. there are 9000 operations involved. In addition, if the number of names that can be entered into the system per day is one thousand, the staff needs 9 days per week to do this work, which is actually impossible, therefore cloud computing will be utilized for saving and storage, along with a transformation program that handles the process ongoing between the foreign tour operator and the local tour operator in order to solve the aforementioned problem.

Work Flow
The process starts by receiving the rooming list from the foreign operator and this is the first time the reservation is conducted. This rooming list contains data such as the full names of the clients, arrival and departure dates, exact itinerary, flight details …etc. 1) Printing the rooming list. 2) Entering the rooming list to the system. 3) Sending e-mails to hotels, floating hotels, ticketing departments in order to finalize the reservation process. 4) Receiving the respective confirmation from all the departments. 5) If the foreign operator sends any amendment to the above reservation then here arises the problem since the foreign operator will send all the rooming lists again with a any change. 6) These rooming lists will be printed once again by the local operator. A comparison is held by eyesight between the printed rooming lists and the newly received rooming lists with the changes in data regarding the flight lists, hotel change, a guest's name is cancelled or added. 7) After reviewing the new rooming list, the changes are re-entered into the already existing system details.
The cause of the problem here is the fact that this cannot be done in different way, since the foreign operator has a system that sends data as bulk without division or specifications.

Building Integrated System Application
The guest should provide us two files one is called structure file and other the data itself Fig 3 contains data send from the foreign tourism agency reservation file.
The tourism agency should send us a structure files This is a guide to help us where we can start and stop saving the data contain an example for the method would be used for making the integration between the local and foreign agency.
The data format sent by the foreign tour operator, showing the approach for saving the data into the system of local tour Operator.
This table is significant since it is considered a map on which the process of data saving is based.
By using data sent file we can make the date transformation process successfully.
After the clients send the files where in the form on e-mail or through thy portal cloud, In table 1 illustrates the data format sent by the foreign tour operator, showing the approach for saving the data into the system of local tour Operator. This table is significant since it is considered a map on which the process of data saving is based.
By using table 1

For Example
When we look at table 1 we can see from and to which mean that 68 to 74 means the system has to go to data file in fig 3 starting the space 68 ending the space 74 take the data and put it into the local database system in a reservation table into "file number" we shall apply this on all the elements of the above table, then the following table until we finished all  table sent it by the foreign agency.

Operation Code Methodology
Step 1 Read the "Guest" data file which is come from the foreign agency Fig 3 Illustrated the data which is come into txt file format, each line contains the data belong to specific "Client" so, After we make the first check in order to make sure if the file is corrupted or has anything wrong ,we need to put each line in database Colum and record and that leads us to the second step.

328
Using Cloud Computing in Supporting the Management of Travel Agencies Step 2 Put the data into record on of them called "Agent Data" and the other called "Agent Id" Step 3 This step is concerned by using both files Guest database file and structure database file for distributing and match the every single record into the host database file After terminating the final stage step 3 the model retrieves the files of the clients and initiates the road map of each agent. This grants the model ability and the flexibility necessary for classifying and organizing the data respective to each agent.
In figure 4 illustrates the Logical Design architecture The right side shows the multiple agents the local company has to deal with; each agency has its own System regardless of the number of agents involved as long as they all the necessary data is provided.


The private cloud for introduces the all necessary infrastructure to maintain the scalability and availability of the foreign agents.  Transformation model which is reasonable for maintaining and mapping the data between the foreign agents systems and the local company system.


The third layer is for providing the travel agencies the storage they are in needed.  Finally the target system which is for the local agency system that includes the system after the integrated has been successful made.

Observations after applying the model on one Agent Company
A relation of direct proportion among three factors: applying the model, time consumption and human factor Example: Once an agent sends its files (rooming list, Ticketing, excursion, transportation …etc), which need 5 dedicated persons working for three full wording day. But after the model is applied, one employee only is needed and for the first time only to check that all is operating well.
The actual time taken depends on the network bandwidth rate.
The more the number of agents involved is, the better the attained results are

Building a Private Cloud
Using Hypervisor for creating your private cloud, it is possible for administrators to combine several VMs on a single server that runs the Hyper-V role. The number of VMs that can be run on a single server varies according to the resources required and the hardware of the physical server that hosts the VMs. In the figure 5 there are two computers that are also known as Nodes. The nodes, combined, make up the cluster. Each of the Nodes have at least two network adapters. One of the network Adapters are used to connect each node to the network. The Second network adapter is used to connect the nodes to each Other via a private network, also called a heartbeat network The private network is used by the cluster service so the nodes Can talk to each other and verify that each other are up and Running. The process of verification uses two processes called the looks alive resource check and the is alive resource check If the resources in the cluster fail to respond to the resource checks after the appropriate amount of time, the passive node will assume that the active node has failed and will start up the service or application that is running on the cluster in the virtual server. Some nodes will also have a third network.
Adapter dedicated to the iSCSI network to access the iSCSI San. Finally by choosing the type of hardware and Virtualizing those using hypervisor and clustering for high availability companied all of this for building the privet cloud. In figure 6 shows the transformation program as a service, deemed as a middle ware which takes the structure files of every agent as a road map on the basis of this structure, thus making the transformation data into the local database agency system.
The VMM virtual machine manger in the private cloud takes care of this issue which VM should be responsible for the data of each agent.

Conclusions
The overall aim of this paper is to identify how we could use cloud computing for business entities to manage their core business that depends on retrieving flow of information from different business systems characterized with non-similar data format To fulfill this aim, this paper describes a model which provides a kind of data transformation with widely agreed upon business characteristics information to allow the translation from different systems to the target system, by using cloud storage as a service as first phase, transformation engine as a second phase and private cloud as a third phase. The aforementioned unified integration is hence created. As a result, the top management of any entity utilizing this model will be able to manage its business in a totally different view witnessing many privileges such as cutting the expenses, utilizing the workforce in different way.
It is worth-mentioning that this integration may be applied to any relevant business domain, but in this research the field of tourism has been taken as an example.