A Scheme for Implementing Load Balancing of Web Server

Size: px
Start display at page:

Download "A Scheme for Implementing Load Balancing of Web Server"

Transcription

1 Journal of Information & Computational Science 7: 3 (2010) Available at A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public Administration, Hubei University, Wuhan , China Abstract This paper analyzes the existing shortcomings of the current load balancing scheme of web serveran improved scheme of load balancing is proposed and putted into practice, the new scheme uses Javabased mobile agent systems to implement the load balancing of web server. The performance of this load balancing scheme is evaluated from two points of view: the whole response time and the file size. The results show that the scheme is an effective method to reduce the load or solve the problems caused by the continuously increasing load of web server. Keywords: Monitor System; Mobile Agent System; Load Balancing; Web Server 1 Introduction With the rapid development of internet and the rapid increase in the number of internet users, online information on various sites and information servers also emerge in endlessly. The throughput of many popular sites and important sites are increasing and the number of concurrent users are continuously increasing, the load of web server is more and more serious and lead to overload operation. This situation has accumulated to a certain extent, which will seriously affects the overall performance of web sites and can not provide users with timely, stable and accurate web services [1]. Therefore, it is very important to ensure that the load balancing of each web server. Load monitoring is an effective way to achieve load balancing. Load monitoring system examines operating condition of web server systems, when a web server is overload, the system optimization is urgently started [2]. On the one hand, it restricts the number of users accessing web server and the data traffic of entering web server; on the another hand, it diverts the overload part of the web server into the other web server of the system to restore the load balancing of web server. This paper presents a load monitoring system based Java mobile agents for web server. The system solves the the existing shortcomings of the current load monitoring system based client/server mode, it is more effective for load monitoring of web server. Corresponding author. address: wujianwu@hubu.edu.cn (Jianwu Wu) / Copyright c 2010 Binary Information Press March 2010

2 760 J. Wu /Journal of Information & Computational Science 7: 3 (2010) Load Balancing Scheme Based on Client/Server Model The client/server model is a centralized load monitoring model.using this model, load monitoring service program must be installed on each web server[3], the program is used to measure the load on each web server, load monitoring client program must be installed on a separate host. After the client program sends a request to the load monitoring service program on each web server, the service program returns the load information to the load monitor client. Throughout the process of communication, the client and the server must remain network connections. The load monitoring system based on client/server model has the following shortcomings: (1) The implementation codes described the load monitoring service on the server is statically bounded with the codes described the process of requesting load monitoring service in the client-side[4]. Once the monitoring strategy itself needs to be improved, it would be a laborious work for web system to replace all the code, that is, the client/server model can not dynamically change the monitoring strategies. (2) The message exchange between the server and the client occupies a large number of network bandwidth, when the network load is heavy, the operation of load monitoring would increase the busy level of the network[5]. At the same time, the server and the client must remain the network connections, which makes that the web server can not respond flexibly to the change in the environment. 3 Load Balancing Scheme Based on Mobile Agent Model Mobile agent is a new type of distributed computing model. In this mode, data can also be processed when the network connection is not reliable, this is the advantages which the traditional distributed mechanism does not have, the model has also the advantages of better robustness of the network and equipment, great flexibility and good upgrade-ability and extensibility[6]. 3.1 Mobile Agent System Based on Java Java-based mobile agent systems () is a software entity which can migrate freely between each node in the network[7]. Fig. 1 shows the structural model of. When migrates from the source node to the destination node, it transfers itself status information and code to the destination node. Here, state information refers to the property values of the task that will soon be implemented, the code refers to the Java class code which the requires. It may implement the data resource sharing by a communication model between. After the task ends, can return the node where created it, can also self-destruct at the current node where the task ends. Distinguish from the client/server model of section 2, it is not necessary for to send a request to the other systems beforehand and then wait for a response.through migrating freely between the nodes in the network, it collects data and uses resources, thus, the execution efficiency is greatly improved. Only when the need to migrate between nodes is a network connection established. The use of has the following advantages :

3 J. Wu /Journal of Information & Computational Science 7: 3 (2010) host A host B mobile agent server mobile agent server security layer Java virtual machine security layer Java virtual machine network Fig. 1: Structural model of (1) Reducing the network load: A large number of interaction between the various systems increases network traffic in a distributed system environment, while only small amounts of data is needed to transfer by using mobile agent technology. (2) Encapsulating protocol: When the data are exchanged in a distributed system, each host has its own network protocol, the protocol will encode outgoing data and explain incoming data[8]. In order to meet the requirement of the efficiency and safety, the protocol is often needed to improve, but upgrading the code which implement the protocol is almost impossible or very difficult, so it will have a legacy protocol. The mobile agent can directly move to the remote host to establish a data transmission channel based on private procedures. (3) Reducing the network delay time: There is more or less delay time for the cross-network real-time processing system[9], while the mobile agent can directly implement the task that manager requirements by migrating itself. 3.2 The System Diagram Fig. 2 shows the block diagram of whole load monitoring system. It can be seen that the whole system is composed of the web server being monitored and load monitoring server. Each server contains a mobile agent server(). is the important component of load monitoring systemand it is available execution environment on the host as well as the important management functions of the mobile agent system. The mobile agent in the system is divided into two kinds: master mobile agents (MA) and slave mobile agent(). The MA runs on the load monitoring server, which periodically creates and migrates it to the web server being monitored. The migrates to the first web server, analyzes its log file of system operation, system load conditions and then sends the load information to the MA, and then it migrates to the next web server to complete the same task. The MA provides

4 762 J. Wu /Journal of Information & Computational Science 7: 3 (2010) users with graphical user interface (GUI) and collects the load information of various web server to display to the user. web server 1 log file load monitoring server send load information web server 2 log file MA web server n -- create master mobile agent -- create slave mobile agent -- collect load information -- provide GUI log file --receive slave mobile agent --server load monitoring --return load information --migrate slave mobile agent Fig. 2: Web server s block diagram of load monitoring system based on 3.3 The Java Class Used in the System The whole load monitoring system achieves the following three Java classes: (1) View class: The MA provides the GUI function to users by view class and displays the web server s load information collected from to the user. (2) Migration routes class : The migration routes class contains the address of web server being monitored. Once the MA created the, then the migrates to the next web server according to the address provided by migration routes class. When the target web server breaks down, the migration routes class also provides the function of the migrating to other web server. (3) Monitoring class: After the migrates to a web server, the current user number, the current data transfer rate, the current error number, the average number of current processing task, the usage rates of currently available storage area, the currently usable capacity of a disk and remaining available capacity can be measured by monitoring class. The monitoring information are then sent to the MA. Fig.3 describes the role of the various Java classes in the whole load monitoring system.

5 J. Wu /Journal of Information & Computational Science 7: 3 (2010) M A create p eriodicly m igra tion rou tes address information migra tion m onito rin g c lass load m onitorin g sen d load info rma tion disp lay lo ad information view class Fig. 3: The application of Java classes in the load monitoring system 4 The System Performance Evaluation We first introduce the parameters of reflecting the load monitoring system before introducing the performance standard of it. The load generally refers to the number of the tasks which have not yet completed or the usage rate of resource assigned to an object in a moment[10], it can be determined by the following parameters: (1) the number of tasks running in the queue, that is, the number of the load on a node; (2) the time percentage of CPU idle time; (3) theratio of available memory; (4) the average load within recently time t; (5) the average transmission rate of network communication. In order to more accurately reflect the load, it often needed to collect more parameters, however, this method is often invalid for performance improvement because of increased overhead. For example, we perform boolean operation AND or OR for the two of six parameters, the average response time is longer than using a single parameter. 4.1 Total Response Time Evaluation One of the important standard measuring the performance of load monitoring system of web server is the total system response time. The total response time of the load monitoring system depends primarily on the following aspects: load monitoring server and web server s CPU speed and memory capacity, network bandwidth and message type of web system, etc. The total response time of the load monitoring system presented in this paper can be approximately expressed as: K τ = t m + t a + t d. In which t m is the execution time of the load monitoring operation on the load monitoring server, t a is the time consumed by the completing the specific monitoring task in a web server, t d is the network delay time. Fig. 4(a) shows the time consumed by the traditional client/server model implementing load monitoring system, Fig. 4(b) shows the time consumed by the implementing load monitoring system. In which t m1 is the delay time of load monitoring server to the web server, t 1m is the delay time of the web server 1 to the load monitoring server. As the monitoring information which the

6 764 J. Wu /Journal of Information & Computational Science 7: 3 (2010) sends to MA only increase very little network traffic (comparing to the network traffic which the itself increase during migration), therefore, the part of the delay time may be ignored in the response time evaluation. t m1 t 1m t m1 t 12 web server 1 web server 1 load monitoring server t m2 web server 2 load monitoring server web server 2 t nm1 t 2m t mn1 t nm1 web server N web server N (a) (b) Fig. 4: The required time for implementing the load monitoring system in two ways For the web system containing N web servers, using client/server model to implement load monitoring is needed to create N times request, however, using the model to implement load monitoring is only needed to create a time request, so the time consumed by the load monitoring server itself is respectively: T mc = N t m. T mj = t m. In addition, assuming that the delay time of data transmission between each node is the same (namely, assuming t m1 =t m2 =t mn = =t 12 =t 23 = =t ), then the total network delay time of using of client/server model is T d = 2N t, however, the total network delay time of model is (N + 1) t, then T τ in two situations is respectively: T τc = 2N t + N t m + N t a. T τj = (N + 1) t + t m + N t a. It can be seen, when the number of web sites being monitored is increased, the total response time of web server s load monitoring system using model is significantly lower than using the traditional client/server model. 4.2 The Monitoring File Size The file size of running on each web server is as follows: the s file size is 5.5KB, the migration routes class s code size is 3.4KB, the monitor class s code size is 6.2KB, the total file size is about 15.1KB. In other words, after the migrates to a web serverthe class s code size which

7 J. Wu /Journal of Information & Computational Science 7: 3 (2010) the whole load monitoring process only loads is 15.1KB; after the monitoring mission is finished, it just destroys the class code whose size is 15.1KB. Therefore, the efficient of the web server s load monitoring system based on is far more higher than the load monitoring system of client/server model. When the migrates to the first web server, it is needed to load all the code whose size is 15.1KB. Every time the migrates, it simply transfers the program whose size is 5.5KB, thus, the network traffic is greatly reduced. 5 Conclusion Load balancing is the key part of the load monitoring system of web server, the use of process migration mechanisms can improve the dynamics of load balancing and the throughput. The web server s load monitoring system based on Java has solved the defects in the load monitoring system of client/server model. Through the use of, the flexibility and reconfigurability of load monitoring is improved and it has better environment adaptability and practical and research value. Next, we will make further research on the safety of the whole load monitoring systemwhich mainly deals with the authentication of mobile agent s legitimacy, protecting the data carried by the mobile agent, anonymous signature issues, preventing certain malicious attack and illegal modifying of the and so on. References [1] X. Zhang, Research on load balancing of the web server, Journal of University of Electronic Science and Technology of China, May 2005 [2] Y. Cheng, The study and realization of server monitor system, Journal of Huazhong University of Science and Technology, November 2005 [3] Z. Q. Li, A load monitoring system of PC cluster, Microcomputer and Its Applications, August 2003 [4] R. Y. Fei, Monitoring system of enterprise ethernet based on C/S, Journal of Beijing University of Technology, June 2004 [5] X. Qin, Load balancing support for I/O-intensive parallel jobs in a cluster of workstations[c], Proceedings of IEEE International Conference on Cluster Computing, Hong Kong, 2006, pp [6] C. C. Hui, Improved strategies for dynamic load balancing[j], IEEE Concurrency, 2004, pp [7] H. Y. Huang, Solution to problem of malicious agents of Java based mobile agent systems, Computer Engineering and Design, March 2004 [8] T. Hu, Research and design on security architecture of mobile agent system based on Java, Journal of Najing University of Posts and Telecommunications, March 2005 [9] Z. Y. LiuHu, Effective dynamic load balancing method, Journal of Software, December 2005, pp [10] Roabert D. Woolley, Web performance measurement and capactity planningbriefing paper[z],state Information Architect, January 2006

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

System types. Distributed systems

System types. Distributed systems System types 1 Personal systems that are designed to run on a personal computer or workstation Distributed systems where the system software runs on a loosely integrated group of cooperating processors

More information

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4 5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING

A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING A NOVEL ARCHITECTURE FOR DYNAMIC LEAST COST ROUTING Peer Hasselmeyer Information technology Transfer Office, Darmstadt University of Technology Wilhelminenstr. 7, 64283 Darmstadt, Germany E-mail: peer@ito.tu-darmstadt.de

More information

Dynamic Adaptive Feedback of Load Balancing Strategy

Dynamic Adaptive Feedback of Load Balancing Strategy Journal of Information & Computational Science 8: 10 (2011) 1901 1908 Available at http://www.joics.com Dynamic Adaptive Feedback of Load Balancing Strategy Hongbin Wang a,b, Zhiyi Fang a,, Shuang Cui

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer

More information

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge

emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge emontage: An Architecture for Rapid Integration of Situational Awareness Data at the Edge Soumya Simanta Gene Cahill Ed Morris Motivation Situational Awareness First responders and others operating in

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)

Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing) 1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

The Improved Job Scheduling Algorithm of Hadoop Platform

The Improved Job Scheduling Algorithm of Hadoop Platform The Improved Job Scheduling Algorithm of Hadoop Platform Yingjie Guo a, Linzhi Wu b, Wei Yu c, Bin Wu d, Xiaotian Wang e a,b,c,d,e University of Chinese Academy of Sciences 100408, China b Email: wulinzhi1001@163.com

More information

An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers

An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers Journal of Computational Information Systems 9: 7 (23) 689 6829 Available at http://www.jofcis.com An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers Lianying

More information

Modeling for Web-based Image Processing and JImaging System Implemented Using Medium Model

Modeling for Web-based Image Processing and JImaging System Implemented Using Medium Model Send Orders for Reprints to reprints@benthamscience.ae 142 The Open Cybernetics & Systemics Journal, 2015, 9, 142-147 Open Access Modeling for Web-based Image Processing and JImaging System Implemented

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Distributed Systems Architectures

Distributed Systems Architectures Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems

More information

EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING

EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING Ranjana Saini 1, Indu 2 M.Tech Scholar, JCDM College of Engineering, CSE Department,Sirsa 1 Assistant Prof., CSE Department, JCDM College

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS

MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 1. Goals and Overview 1. In this MP you will design a Dynamic Load Balancer architecture for a Distributed System 2. You will

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES

IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 6 June, 2013 Page No. 1914-1919 IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES Ms.

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *

A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS * International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 1, pp. 31 41, 2016 A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology Send Orders for Reprints to reprints@benthamscience.ae 1582 The Open Cybernetics & Systemics Journal, 2015, 9, 1582-1586 Open Access The Construction of Seismic and Geological Studies' Cloud Platform Using

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

The Study on Web GIS Architecture Based on JNLP

The Study on Web GIS Architecture Based on JNLP ISPRS SIPT IGU UCI CIG ACSG Table of contents Table des matières Authors index Index des auteurs Search Recherches Exit Sortir The Study on Web GIS Architecture Based on JNLP Li Luqun 1, Li Jian 2,Tian

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical

More information

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic

More information

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer

A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn

More information

Research on Reliability of Hadoop Distributed File System

Research on Reliability of Hadoop Distributed File System , pp.315-326 http://dx.doi.org/10.14257/ijmue.2015.10.11.30 Research on Reliability of Hadoop Distributed File System Daming Hu, Deyun Chen*, Shuhui Lou and Shujun Pei College of Computer Science and Technology,

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing

More information

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing

Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

Virtual PC-Type Thin Client System

Virtual PC-Type Thin Client System Thin Client Virtual PC-Type Thin Client System KAWASHIMA Hiroyuki, KOSHIBA Kunihiro, TUCHIMOCHI Kazuki, FUTAMURA Kazuhiro, ENOMOTO Masahiko, WATANABE Masahiro Abstract NEC has developed VirtualPCCenter,

More information

An Advanced Commercial Contact Center Based on Cloud Computing

An Advanced Commercial Contact Center Based on Cloud Computing An Advanced Commercial Contact Center Based on Cloud Computing Li Pengyu, Chen Xin, Zhang Guoping, Zhang Boju, and Huang Daochao Abstract With the rapid development of cloud computing and information technology,

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast

Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast International Conference on Civil, Transportation and Environment (ICCTE 2016) Research of Railway Wagon Flow Forecast System Based on Hadoop-Hazelcast Xiaodong Zhang1, a, Baotian Dong1, b, Weijia Zhang2,

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

Secure Network Monitoring System using Mobile Agent

Secure Network Monitoring System using Mobile Agent 1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com

More information

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing

Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

Scalable Multiple NameNodes Hadoop Cloud Storage System

Scalable Multiple NameNodes Hadoop Cloud Storage System Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

Shared Parallel File System

Shared Parallel File System Shared Parallel File System Fangbin Liu fliu@science.uva.nl System and Network Engineering University of Amsterdam Shared Parallel File System Introduction of the project The PVFS2 parallel file system

More information

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT

CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Intrusion Detection Architecture Utilizing Graphics Processors

Intrusion Detection Architecture Utilizing Graphics Processors Acta Informatica Pragensia 1(1), 2012, 50 59, DOI: 10.18267/j.aip.5 Section: Online: aip.vse.cz Peer-reviewed papers Intrusion Detection Architecture Utilizing Graphics Processors Liberios Vokorokos 1,

More information

A Study of Application Recovery in Mobile Environment Using Log Management Scheme

A Study of Application Recovery in Mobile Environment Using Log Management Scheme A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks

Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Load Balance Scheduling Algorithm for Serving of Requests in Cloud Networks Using Software Defined Networks Dr. Chinthagunta Mukundha Associate Professor, Dept of IT, Sreenidhi Institute of Science & Technology,

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

A Middleware Strategy to Survive Compute Peak Loads in Cloud

A Middleware Strategy to Survive Compute Peak Loads in Cloud A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk

More information

POWER ALL GLOBAL FILE SYSTEM (PGFS)

POWER ALL GLOBAL FILE SYSTEM (PGFS) POWER ALL GLOBAL FILE SYSTEM (PGFS) Defining next generation of global storage grid Power All Networks Ltd. Technical Whitepaper April 2008, version 1.01 Table of Content 1. Introduction.. 3 2. Paradigm

More information

Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle

Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Agenda Introduction Database Architecture Direct NFS Client NFS Server

More information

IBM Tivoli Monitoring for Network Performance

IBM Tivoli Monitoring for Network Performance Optimize networks to increase application performance and availability IBM Tivoli Monitoring for Network Performance Highlights Performance management for today s networks Today s networks are a combination

More information

Cloud Panel Service Evaluation Scenarios

Cloud Panel Service Evaluation Scenarios Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

Cloud Policy Model in the Desktop Management System

Cloud Policy Model in the Desktop Management System I.J.Modern Education and Computer Science, 2010, 1, 24-31 Published Online November 2010 in MECS (http://www.mecs-press.org/) Cloud Policy Model in the Desktop Management System Fang Zhao Beijing Forestry

More information

Various Schemes of Load Balancing in Distributed Systems- A Review

Various Schemes of Load Balancing in Distributed Systems- A Review 741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing.

Keywords Load balancing, Dispatcher, Distributed Cluster Server, Static Load balancing, Dynamic Load balancing. Volume 5, Issue 7, July 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Hybrid Algorithm

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

A Novel Approach for Load Balancing In Heterogeneous Cellular Network A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1

More information

Platform Technology VALUMO for Dynamic Collaboration

Platform Technology VALUMO for Dynamic Collaboration Platform Technology VALUMO for Dynamic Collaboration By Minoru TERAO,* Yasuo IWAOKA, Kouichi HADANO, Masato YAMAMOTO, Naoto ISHIKURA and Junko ITOH Due to the rapid development of IT (Information Technology)

More information

Distributed Systems LEEC (2005/06 2º Sem.)

Distributed Systems LEEC (2005/06 2º Sem.) Distributed Systems LEEC (2005/06 2º Sem.) Introduction João Paulo Carvalho Universidade Técnica de Lisboa / Instituto Superior Técnico Outline Definition of a Distributed System Goals Connecting Users

More information

The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform

The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform The Comprehensive Performance Rating for Hadoop Clusters on Cloud Computing Platform Fong-Hao Liu, Ya-Ruei Liou, Hsiang-Fu Lo, Ko-Chin Chang, and Wei-Tsong Lee Abstract Virtualization platform solutions

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Shreyansh Kumar School of Computing Science and Engineering VIT University Chennai Campus Parvathi.R, Ph.D Associate Professor-

More information

Operating Systems OBJECTIVES 7.1 DEFINITION. Chapter 7. Note:

Operating Systems OBJECTIVES 7.1 DEFINITION. Chapter 7. Note: Chapter 7 OBJECTIVES Operating Systems Define the purpose and functions of an operating system. Understand the components of an operating system. Understand the concept of virtual memory. Understand the

More information

An ECG Monitoring and Alarming System Based On Android Smart Phone

An ECG Monitoring and Alarming System Based On Android Smart Phone Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android

More information

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method

More information

Design of Electric Energy Acquisition System on Hadoop

Design of Electric Energy Acquisition System on Hadoop , pp.47-54 http://dx.doi.org/10.14257/ijgdc.2015.8.5.04 Design of Electric Energy Acquisition System on Hadoop Yi Wu 1 and Jianjun Zhou 2 1 School of Information Science and Technology, Heilongjiang University

More information