Simulation of Dynamic Load Balancing Algorithms
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2015, Vol 5, Issue 1
Abstract
Cloud computing is a new technology which uses virtual machines instead of physical machines to host, store and network different components. Load balancing is a methodology to distribute workload across multiple computers, or other resources over the network links to achieve optimal resource utilization, minimum data processing time, minimum average response time, and avoid overload. The load balancing is to be done properly to gain maximum throughput and performance of cloud. Here we have considered two load balancing algorithms Equally spread current Execution algorithm and Throttled load balancing algorithm and made performance analysis of these algorithms using cloudanalyst. In Section I we gave brief introduction about load balancing in cloud computing. In section II we made a survey of Load balancing algorithms. We explained the two dynamic load balancing algorithms in section III. In section IV we introduced a simulation tool cloud Analyst and in next section V we analyzed the performance of algorithms.
Authors and Affiliations
Dr. S. Suguna , R. Barani
Optimal Testing Resource Allocation Problems in Software System using Heuristic Algorithm
Software Testing is the process of implementing a program with the definite intent of finding errors former to delivery to the end user. Due to the increase and the complexity of the software system the problem is how to...
Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model
This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data betwee...
Provisioning of Data Security for File Transformation on Multi Cloud Storage
In file transformation utilizing proxy re-signatures, once a user in the group is revoked; the data cloud server is able to re-sign the blocks, which were signed by the revoked user, with a resigning key. As a result, th...
Dynamics User Identification Using Pairwise Client Coupling
In this paper due to the increasing vulnerabilities in the internet, security alone isnt sufficient to keep a rupture, however digital crime scene investigation and cyber intelligence is also required to prevent future a...