Efficient Resource Scheduling in Data Centers using MRIS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 5
Abstract
Scheduling the resources is decisive in shared data centers. Today scheduling algorithms focus only on onedimensional resource models, infact the multiple resources (e.g. Memory, Storage, CPU and Network bandwidth) can be consumed concurrently. There is a lot of demand for multiple resources in cloud computing which allows various users to share a data center. This paper depicts resource scheduling problem to a bounded multi-dimensional knapsack problem, taking into account the requirement dependency among multi-dimensional resources. Due to the NP hardness of B-MDKP, we present Multi-dimensional Resource Integrated Scheduling (MRIS), an inquisitive algorithm to obtain the approximate optimal solution. MRIS will be highly efficient and achieves high performance for a various set of workloads.
Authors and Affiliations
S. NAGENDRAM , J. VIJAYA LAKSHMI , D. VENKATA NARASIMHA RAO , CH. NAGA JYOTHI
A REVIEW PAPER ON MULTIDIMENTIONAL DATA STRUCTURES
Multimedia Data Structures is needful for storing multimedia data such as Text, Images, Audio, Video, and Graphical Objects. The growth of digital content gave rise to the revolution of very large multimedia Data Structu...
HEAD MOUNTED INPUT DEVICE USING MEMS SENSORS
A person who has limited control over their limbs cannot do much for themselves. If this person stay at home, they need others assistance to do a task. Task also implies those concerned with the PC. Hence, to make them h...
Efficient Algorithms for Distributed Mutual Exclusion in Mobile Ad-Hoc Network
For distributed mutual exclusion problem in mobile environment we presented two algorithms.Both the algorithms are token based. The first algorithm is providing tokens to the nodes which are in critical section and the s...
RECONCILIATION OF CHANGES ON XML LISTS
In this research, we developed an efficient reconciliation method for mobile environments by using edit scripts of XML data sent from each mobile device. To obtain a simple model for mobile devices, we use the XML list d...
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
The major threat to wireless network is Denial of Service attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Here, we address the...