Effective Load Balancing Technique In Pcloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet. But it has more critical issue like security, load management and fault tolerance. In this paper we are discussing Load Balancing approach. Many types of load concern with cloud like memory load, CPU load and network load. Load balancing is the process of distributing load over the different nodes which provides good resource utilization when nodes are overloaded with job. Load balancing has to handle the load when one node is overloaded. When node is overloaded at that time load is distributed over the other ideal nodes. Many algorithms are available for load balancing like Static load balancing and Dynamic load balancing. Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose different strategies for different situations. The algorithm applies the game theory to the load balancing strategy to improve the efficiency in the public cloud environment.
Authors and Affiliations
P Amaravathi, G. Devi Himaja
Power Quality Measurements by Using Fiber Optical Cable
Accurate measurement of power and other AC quantities is extremely important at all levels of the electrical power system, and is of value for both for power distributors and power consumers. This paper describes the...
Admittance Loading Of Dielectric Loaded Inclined Slots In The Narrow Wall Of A H-Plane Tee Junction
Slotted waveguide antennas find applications in microwave communication and radar systems requiring narrow beam or shaped beam patterns because of its compactness. They are particularly useful in airborne, space craft...
Phishing Detection In Selected Feature Using Modified SVM-PSO
The sensitive information such as passwords, credit card number, account details, email information and credential of the external users robbed by threats such kind of threat is called phishing. So many softwareand t...
Performance Analysis of Pilot Based Channel Estimation in OFDM System using Recursive Least Square Estimator
For a wireless communication system, the channel is unknown a priori to the receiver. Channel parameter estimation is used for improving data transmission performance. To estimate the channel properties and correct t...
A Review Paper on Colored Petri Nets and their Application in Protocol Verification
Colored Petri Nets is a graphical oriented language for design, verification and validation of systems. It is mainly used in systems where concurrency, communication and synchronisation are important. This paper is an...