Trust Based Load Distribution in a Data Grid Environment
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
The basic idea of a load balancing system is to transfer partial of system workload from busy nodes to some idle nodes. The target resource selection for task migration is a key factor in the load balance strategy. As grid is dynamic in nature, resources may join or leave the grid at any instance of time. It’s inefficient to select a target resource that often leaves the grid and hence the tasks may be rescheduled for several times. When the cost of load transmission is not negligible, the overhead of the load balancing strategy will be unacceptable. In that case, the cost of propagating system load will be extremely high. To improve the efficiency of the load balancing process, one can select trustworthy resources from the list of available resources. In this paper we present a load distribution strategy that considers the trustworthiness of the resource as a benchmark for participation in the load balancing process. The simulation results show that the load distribution among the trustworthy resources results better system throughput compared to load distribution to all available resources in the grid.
Authors and Affiliations
Shaik Naseera , Dr. K. V. Madhu Murthy
IMPROVED ROUND ROBIN POLICY A MATHEMATICAL APPROACH
This work attempts to mathematically formulize the computation of waiting time of any process in a static -process, CPU-bound round robin scheme. That in effect, can calculate other performance measures also. An improv...
A Novel Approach to Clustering of Proteins
Data Analysis plays an indispensable role for understanding various phenomena. Clustering algorithms are a class of important tools for data analysis. K-means cluster analysis is considered to cluster protein variates ac...
Web Services Security Architectures Composition and Contract Design using RBAC
Service Oriented Architecture’s Web Services authorization traditionally is done using common access control models like Role-Based Access Control. In thinking of a composite application that stitches together the capabi...
ON THE DESIGN OF PROJECTIVE BINARY EDWARDS ELLIPTIC CURVES OVER GF (P) BENEFITING FROM MAPPING ELLIPTIC CURVES COMPUTATIONS TO VARIABLE DEGREE OF PARALLEL DESIGN
Finding multiplicative inverse (Modular Inversion) operation is the most time-consuming operation in Elliptic Curve Crypto-system (ECC) operations which affects the performance of ECC. Moreover, several factors that affe...
Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding
Thresholding is an important task in image processing. It is a main tool in pattern recognition, image segmentation, edge detection and scene analysis. In this paper, we present a new thresholding technique based on two-...