An Optimization Model of Load Balancing in P2P SIP Architecture
|
|
- Homer Black
- 8 years ago
- Views:
Transcription
1 An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Beijing University of Posts and Telecommunications, clybuptbjc@gmail.com Abstract Based on the study of the existing load balancing strategy, this article offered an algorithm called AHBA (Adaptive Heterogeneous Balancing Algorithm) designed for mobile hot spot problem considering both node address space and node capacity adaptive heterogeneity. This strategy takes into account the heterogeneity of the nodes and rational allocation of address space to reallocate of the loads on super nodes, thus to improve the performance of P2P network. AHBA algorithm can be divided into two steps: initial distribution and adjustment. AHBA algorithm firstly carefully assigns the node ID for each serving node according to the load on each node and the capacity of each node. When the load of the network is uneven, a new node would be added to the network or one old node's ID would be changed. The changed or new node's ID is carefully computed by AHBA adjust algorithm. 1. Introduction Keywords: P2P, Load Balancing, Node Weights, Node Identification Distributed VoIP network is a hot topic in both academic and industry fields. The distributed VoIP network possesses the features such as distributed, decentralized, scalability and robustness. Usually distributed VoIP network apply P2P as the overlay architecture and SIP as the signal protocol. The other advantage of distributed VoIP network is that it could solve the existing problems such as the single point failure problem caused by the traditional client and server architecture of the SIP system. Furthermore, the performance bottleneck could also be solved by applying distributed VoIP network. For a well-designed distributed VoIP system, it must be able to gracefully handle the uncertainty and instability caused by the load of day-to-day communication activities. Those activities might lead to the booming number of online users and inconsistent user density in the two separate time intervals. As a result these uncertain activities would cause uncertain load for the VoIP system. This article proposes a load balancing algorithm "Adaptive heterogeneous network load balancing strategy - AHBA (Adaptive Heterogeneous Balancing Algorithm) to effectively erase the uneven load sharing of the network resources and solve the resource allocation problem. Our main method is to effectively allocate the node identifier according to the history records not randomly when the network initially established. And then when the system runs for a while, there might be some uneven load in the network. When the network is uneven, the algorithm will adjust the node identifier according to the real-time status of the network. Here the network we means the distributed VoIP network which applies DHT algorithm in the P2P overlay. In detail, the AHBA algorithm can be divided into two steps: initial distribution and adjustment. AHBA algorithm firstly carefully assigns the node ID for each serving node according to the load on each node and the capacity of each node. When the load of the network is uneven, a new node would be added to the network or one old node's ID would be changed. The changed or new node's ID is carefully computed by AHBA adjust algorithm. 2. Related Work Load balancing algorithm is to avoid load imbalance by distributing application load among the nodes in proportional to node capacities. A good load balancing should have good performance in balancing the utilization rate of each node. This article focus on the load balancing algorithm in P2P overlay using Distributed Hash Table (DHT). In DHT system, each node will obtain an independent and unified identity ID by the consistent hash or random function. The article [1] has confirmed that International Journal of Digital Content Technology and its Applications(JDCTA) Volume 7, Number 11, July 2013 doi : /jdcta.vol7.issue
2 the generated node ID, resulting in a maximum interval of O (logn / N) minimum interval of O (N 2 ), i.e. Bn = O (NlogN). To solve the node bearer address space non-equilibrium, the key is to design an improved hash ID generating algorithm. One improved hash function or ID generation mechanism is to use local detection scheme to dynamically adjust the node ID for each physical nodes. [ ] When a new node is added, firstly consistency hash function or random function generates a node ID, and then by detecting the load state of its neighbor regions, adjust the node ID to generate a new adjusted ID thus achieve a partial load balancing. When the system is in the instability situation or the load distribution changes, dynamically adjusted some ID of the node to perform load balancing. The article [13] proposes a mechanism to compute the node weight using a representative group of node parameters and a so-called service profile. The novelty of Node Weight Computation (NWC) is taking into account several parameters in the weight computation and the technique to create the service profile applying factorial design and multi-objective optimization based on simulation. Moreover, NWC can be used for node weight computation in MANETs also by other clustering algorithms. However this passage only focuses on node capacity heterogeneity ignoring the allocation of the address space which largely influences the load distribution. According to the previous research, most researchers only focus on the address space strategy or the heterogeneous nodes balancing strategy. However, the real overlay P2P network is not evenly distributed not only in the address space but also in the nodes heterogeneity. Besides, all these focus on the general property of P2P network without considering business service specificity. In this article, we will propose an optimization model of load balancing in P2P SIP architecture considering both nodes heterogeneity and address space distribution. 3. Definition Introduction in AHBA Algorithm Before introducing the AHBA algorithm, first there are some definitions and formulas that should be explained. In terms of node, the definitions include node capacity Ci, node load Li, node utilization Ui, node ideal load Pi, the rate of deviation of a single node load ei. While in terms of network, related definitions are the network capacity utilization U and the network load deviation E Compute node capacity Ci The user activities in the DHT system would put load for every resource system in serving node such as storage space, CPU consumption, transmission bandwidth, etc. This article viewed all the factors that affect node capacity, such as CPU speed, storage capacity, memory, I / O response rate and bandwidth, as a resource. The parameter node capacity Ci represents node maximum carrying capacity for node i. This article established a dynamic weighted capacity assessment model, obtain the node capacity Ci[ ]: Ci = P(CPU) w1 + P(Space) w2 + P(Memory) w3 + P(IO) w4 + P(BandWidth) w5 In this formula, the capacity for each serving node is determined by the each resource such as CPU capacity, transmission bandwidth, and memory capacity according to how much they can influence the capacity. In detail, the wi represents each factor s weight; P (X) represents the measure of the ability of Resource X value. Different application systems are different from the configuration of the respective factors weight. For example, the server cluster had high I / O and bandwidth requirements for each node, so the weights of the corresponding I / O and the bandwidth can be configured for a larger value. Empirical model can be used to set wi as well. By collect the physical parameters and historical data, we can get the corresponding relations of each resource to its capacity. And according to the corresponding table, we can get the final node capacity Ci that would reflect the maximum number of objects that could serve Compute the nodes load Li 19
3 Distributed network based on a DHT, the load of the node includes both the occupied storage space and also a processing task related CPU overhead and data transfer and application layer routing maintenance brought bandwidth consumption. These loads are associated with the number of objects that need to be served in general. Usually the relationship between the numbers of objects of the node service is linear. Li = Ni Q Li represents the node load; Ni represents the number of objects that node i servers; Q represents is a constant value based on historical experience Compute the node capacity utilization Ui The node capacity utilization Ui is the ratio between node load L and node capacity C. That means for node i, its capacity utilization is Ui: Ui = Li/Ci 3.4. Compute the network capacity utilization U The capacity utilization of the defined system is the ratio between the total load of the system and the total system capacity U = Li Ci 3.5. Compute node ideal load Pi Calculate a single the SN "ideal load" is the product of the system capacity utilization and node capacity Pi = U Ci 3.6. Calculate the rate of deviation of a single node load ei The defined node load deviation rate e node ratio of the deviation of the actual load node ideal load and node capacity, node i load deviation rate e 3.7. The network load deviation E ei = (Pi Li)/Ci The network load deviation E is defined as the sum of each node s deviation rate. 4. AHBA Algorithm Introduction E = ei AHBA Algorithm could solve the problem of uncertain load caused by user activities. In order to solve these problems, AHBA Algorithm applies the ID manipulation strategy. Generally speaking, AHBA algorithm firstly carefully assigns the node ID for each serving node according to the load on each node and the capacity of each node. In such scenarios, each physical node runs a single ID firstly. When the load of the network is uneven, a new node would be added to the network or one old node's ID would be changed. The changed or new node's ID is carefully computed by AHBA adjust algorithm. In detail, AHBA algorithm could be divided into 3 parts. 20
4 i. Distributed the original node ID based on the history record in traditional communication system; ii. If partial network overloaded using specific adjust algorithm. In this step, either a new node is added or an old node s ID is changed. iii. Add new node when the network in the whole is overloaded using specific expansion algorithm; The Fingure 1 AHBA Algorithm Flow Process Chart displays the AHBA Algorithm Process simply. In detail, firstly the AHBA algorithm will run the initial distribution module to assign node ID for the super nodes. When the network utilization rate U is above the threshold low_network (low threshold level for the network) below threshold high_network (the high threshold level for the network), the AHBA algorithm will run the adjustment module to adjust some nodes ID to balance the load across the whole network. When the network utilization rate U is above threshold high_network, the AHBA algorithm will run the expansion module to add new nodes to the original overlay in order to expand the network scale. The parameter threshold low_network and threshold high_network can be set according to the past experience and should be variable according to different system. Figure 1. AHBA Algorithm Flow Process Chart 4.1. Initial Distribution Based on our survey, the traffic in VoIP system is quite similar with the traffic in traditional communication system. According to these, the initial distribution for the server node should not be random. In ABHA Algorithm, we first analyze the traffic in original communication and the initial load for node in VoIP system should be considered as a constant ratio of the original one. So the initial ID for node I should be calculated as follows. Id = Id + K K Idi represents the node id for node i; Ki represents the traditional traffic for users in the region same with node I; S represents all the address space for the network. S 21
5 4.1. Adjust and Expansion Algorithm If the network utilization rate U is above the threshold low_network (low threshold level for the network) below threshold high_network (the high threshold level for the network), but some node s utilization rate ui is above threshold high_node (the high threshold for per node), then we should adjust the network. The adjust algorithm could be divided into steps: i. Order each node in the network according to the node deviation ui; ii. Execute the following steps until no node s ration is above threshold high_node ; a) If the utilization rate of previous node i-1 is below threshold low_network, distribute new ID for the node i according to the following formula. Id i represents the ID for node i ; Id i- 1reprensents the Id for node i-1; P i represents the ideal load for node i. Id = Id + Pi b) If the utilization rate of previous node i-1 is above threshold low_network and the utilization rate of node i-2 is also above threshold low_network, activate new serving node. i. Recalculate the network utilization rate U; ii. Recalculate the perfect load Pi for node I, Pi-1 for node i-1; iii. Recalculate the perfect load P new for the newly added node; iv. Recalculate the newly node for node i, node i-1 and also new node; Id = Id + Pi If the network utilization rate U is above threshold high_network, i. Order each node in the network according to the node deviation ui; ii. Execute the following steps until no node s ration is above threshold high_node : a) If the utilization rate of previous node i-1 is above threshold low_network and the utilization rate of node i-2 is also above threshold low_network, activate new serving node. i. Recalculate the network utilization rate U; ii. Recalculate the perfect load Pi for node I, Pi-1 for node i-1; iii. iv. Recalculate the perfect load P new for the newly added node; Recalculate the newly node for node i, node i-1 and also new node; Id = Id + Pi 4. Simulation experiments and results In this architecture, the underlying overlay is using Chord protocol as the P2P algorithm. In the simulation experiment, the resources and traffic is a simulation of real situation. The simulation parameters are listed in the Table 1 Simulation Experiment Configuration. In the real world, the network scale is very large usually thousands or ten thousands. In this simulation we choose one thousand. Besides, in the real situation, the data transfer cost would be very large when executing the ABHA algorithm. Because of this, the aim of this article is to compare the traditional algorithm and ABHA algorithm according to the balanced effect. Table 1.Simulation Experiment Configuration Parameters Description Value L N Cmax The space for ID Network scale Node Max Capacity
6 C Node Capacity [1,50] This article compares the ABHA algorithm and the traditional random distribution algorithm based on the network load balanced degree of probability distribution. According to the Figure 2 Comparison between ABHA Algorithm and Random Algorithm, the ABHA algorithm largely improves the balanced degree in the VoIP network. As the network scale expands, the network load deviation value of ABHA Algorithm increases much slower than that of Random ID Generation Algorithm. To be specific, the horizontal axis represents the network scale and the ordinate axis represents the network load deviation. For the legend, the solid line represents the ABHA Algorithm and the dotted line represents the Random ID Generation Algorithm. The network load deviation for Random ID Generation Algorithm and ABHA doesn t have much differences when the network scale is below 150. However the network deviation for Random ID Generation largely exceeds that of ABHA Algorithm when the network scale is beyond 197. That means the network balancing of ABHA Algorithm is much better than that of Random ID Generation Algorithm when the network scale is over 197. network load deviation network scale Random ID Generation Algorithm ABHA Algorithm Figure 2.Compare between ABHA Algorithm and Random Algorithm 5. Conclusions This paper proposes a load balancing algorithm based on the integration of P2P SIP VoIP network, mainly to solve the mobile hot issues caused by user behavior. The load balancing algorithm combines the heterogeneous characteristics of the network nodes for load balancing and network address space allocation for load balancing. AHBA algorithm firstly carefully assigns the node ID for each serving node according to the load on each node and the capacity of each node. In such scenarios, each physical node runs a single ID firstly. When the load of the network is uneven, a new node would be added to the network or one old node's ID would be changed. The changed or new node's ID is carefully computed by AHBA adjust algorithm. In the future, the author will continue to measure the cost of the network migration studies, in order to find a balance between the costs and benefits of load balancing for network managers direct guidance. 6. Acknowledgements Important national science & technology specific projects: Next-generation broadband wireless mobile communications network(2011zx ), Innovative Research Groups of the National Natural Science Foundation of China ( ), National Key Basic Research Program of China (973 Program)(2009CB320504). 23
7 7. Reference [1] Jian Liang, NaoumNaoumov, Keith W, "The Index Poisoning Attack in P2P File Sharing Systems", IEEE INFOCOM, vol.6, [2] B. Mitra, S. Ghose, N. Ganguly, "Effect of dynamicity on peer to peer networks", Proceedings of the 14th international conference on High performance computing, pp , [3] B. Mitra, S. Ghose, N. Ganguly, "Stability analysis of peer-to-peer networks against churn", Pramana. Vol.71, no.2, pp , [4] S. Marti, H. Garcia-Molina, "Taxonomy of trust: Categorizing P2P reputation systems", Computer Networks, vol.50, no.4, pp , [5] Godfrey B, Lakshminarayanan K, "Load balancing in dynamic structured P2P systems", IEEE INFOCOM, vol.04, pp , 2004 [6] Wang Bin, Shen Qingguo, "ID management and allocation algorithm for P2P load balancing", Communication Technology(ICCT), pp , 2010 [7] Cheng Jun, "Research of Load Balancing Algorithm in DHT Based P2P Systems", Internet Technology and Applications, pp.1-4, 2010 [8] Atsushi Takeda, Takuma Oide, "Simple dynamic load balancing mechanism for structured P2P network and its evaluation", International Journal of Grid and Utility Computing, pp , 2012 [9] G.T.Chavan, M.A. Mahajan, "Load Balancing in P2P networks using DHT based systems and Ant based systems: A Comparison", International Journal of Engineering Research and Applications (IJERA),vol. 3, pp ,2013 [10] Zhang Bingquan, "An optimization model of load balancing in Peer to Peer (P2P) Network", Computer Science and Service System(CSSS), pp , 2011 [11] WANG Bin, SHEN Qing-guo, "An Effective Algorithm for Hierarchical P2P Load Balancing", JCIT, vol.6, No.5, pp , 2011 [12] Wei Mi, Chunhong Zhang, Xiaofeng Qiu,"Ant-based Load Balancing Algorithm in Structured P2P Systems", JCIT, vol.7, No.6, pp , 2012 [13] KarolyFarkas, Theus Hossmann, "Node Weight Computation in MANETs", Computer Communications and Networks, [14] Ong, Ivy, "Dynamic Load Balancing and Network Monitoring in iata Protocol for Mobile Appliances", Multimedia and Ubiquitous Engineering, pp1-2,2010 [15] Xiangbin Yan, Li Zhai, "C-index: A weighted network node centrality measure for collaboration competence", Journal of Informetrics, pp ,
A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract
More informationAnt-based Load Balancing Algorithm in Structured P2P Systems
Ant-based Load Balancing Algorithm in Structured P2P Systems Wei Mi, 2 Chunhong Zhang, 3 Xiaofeng Qiu Beijing University of Posts and Telecommunications, Beijing 876, China, {miwei985, zhangch.bupt., qiuxiaofeng}@gmail.com
More informationLOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationLoad Balancing in Structured Overlay Networks. Tallat M. Shafaat tallat(@)kth.se
Load Balancing in Structured Overlay Networks Tallat M. Shafaat tallat(@)kth.se Overview Background The problem : load imbalance Causes of load imbalance Solutions But first, some slides from previous
More informationA Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer
A Novel Load Balancing Optimization Algorithm Based on Peer-to-Peer Technology in Streaming Media College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China shuwanneng@yahoo.com.cn
More informationFigure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 shinji10343@hotmail.com, kwang@cs.nctu.edu.tw Abstract One of the most important issues
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationInternational journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
More informationAn Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers
Journal of Computational Information Systems 9: 7 (23) 689 6829 Available at http://www.jofcis.com An Optimized Load-balancing Scheduling Method Based on the WLC Algorithm for Cloud Data Centers Lianying
More informationSLBA: A Security Load-balancing Algorithm for Structured P2P Systems
Journal of Computational Information Systems 8: 7 (2012) 2751 2760 Available at http://www.jofcis.com SLBA: A Security Load-balancing Algorithm for Structured P2P Systems Wei MI, Chunhong ZHANG, Xiaofeng
More informationIMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
More informationResearch on P2P-SIP based VoIP system enhanced by UPnP technology
December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationVaralakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
More information8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
More informationA Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
More informationSuper-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
More informationA COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING TECHNOLOGY APPLICATIONS *
International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 1, pp. 31 41, 2016 A COGNITIVE NETWORK BASED ADAPTIVE LOAD BALANCING ALGORITHM FOR EMERGING
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationIndex Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.
Load Rebalancing for Distributed File Systems in Clouds. Smita Salunkhe, S. S. Sannakki Department of Computer Science and Engineering KLS Gogte Institute of Technology, Belgaum, Karnataka, India Affiliated
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationAn Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
More informationAn Efficient Distributed Load Balancing For DHT-Based P2P Systems
An Efficient Distributed Load Balancing For DHT-Based P2P Systems Chahita Taank 1, Rajesh Bharati 2 1 PG Student, 2 Professor, Computer Engineering Dept DYPIET, PUNE. Abstract- In a distributed system
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationLoad Balancing Algorithm Based on Services
Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao
More informationbcp for a large scale carrier level VoIP system
bcp for a large scale carrier level VoIP system using p2psip draft zhang p2psip bcp 04 Yunfei.Zhang Gang.Li Jin.Peng Baohong.He Shihui.Duan Wei.Zhu {zhangyunfei,ligangyf,pengjin}@chinamobile.com {hebaohong,duanshihui,zhuwei}@catr.cn
More informationMEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS
MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationpacket retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
More informationA Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
More informationA Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationAnalysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationDevelopment of cloud computing system based on wireless sensor network protocol and routing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 204, 6(7):680-684 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Development of cloud computing system based on wireless
More informationResearch for the Data Transmission Model in Cloud Resource Monitoring Zheng Zhi yun, Song Cai hua, Li Dun, Zhang Xing -jin, Lu Li-ping
Research for the Data Transmission Model in Cloud Resource Monitoring 1 Zheng Zhi-yun, Song Cai-hua, 3 Li Dun, 4 Zhang Xing-jin, 5 Lu Li-ping 1,,3,4 School of Information Engineering, Zhengzhou University,
More informationA TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
More informationD1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
More informationRESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
More informationA Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming
A Comparative Study of Tree-based and Mesh-based Overlay P2P Media Streaming Chin Yong Goh 1,Hui Shyong Yeo 1, Hyotaek Lim 1 1 Dongseo University Busan, 617-716, South Korea cgnicky@gmail.com, hui_shyong@hotmail.com,
More informationDisaster Recovery Backup System for P2P Based VoIP Application
Journal of Computational Information Systems 9: 20 (2013) 8099 8109 Available at http://www.jofcis.com Disaster Recovery System for P2P Based VoIP Application Kai SHUANG, Jing XIE State Key Laboratory
More informationThe Power Marketing Information System Model Based on Cloud Computing
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationA QoS-driven Resource Allocation Algorithm with Load balancing for
A QoS-driven Resource Allocation Algorithm with Load balancing for Device Management 1 Lanlan Rui, 2 Yi Zhou, 3 Shaoyong Guo State Key Laboratory of Networking and Switching Technology, Beijing University
More informationA DESIGN OF METADATA SERVER CLUSTER IN LARGE DISTRIBUTED OBJECT-BASED STORAGE
A DESIGN OF METADATA SERVER CLUSTER IN LARGE DISTRIBUTED OBJECT-BASED STORAGE Jie Yan, Yao-Long Zhu, Hui Xiong, Renuga Kanagavelu, Feng Zhou, So LihWeon Data Storage Institute, DSI building, 5 Engineering
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationNew Structured P2P Network with Dynamic Load Balancing Scheme
New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,
More informationquery enabled P2P networks 2009. 08. 27 Park, Byunggyu
Load balancing mechanism in range query enabled P2P networks 2009. 08. 27 Park, Byunggyu Background Contents DHT(Distributed Hash Table) Motivation Proposed scheme Compression based Hashing Load balancing
More informationSla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
More informationA Distributed Architecture of Video Conference Using P2P Technology
1852 JOURNAL OF NETWORKS, VOL. 7, NO. 11, NOVEMBER 2012 A Distributed Architecture of Video Conference Using P2P Technology Xiaoyan Yu State Key Laboratory of Networking & Switching Technology Beijing
More informationRESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009
An Algorithm for Dynamic Load Balancing in Distributed Systems with Multiple Supporting Nodes by Exploiting the Interrupt Service Parveen Jain 1, Daya Gupta 2 1,2 Delhi College of Engineering, New Delhi,
More informationGroup Based Load Balancing Algorithm in Cloud Computing Virtualization
Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information
More informationKeywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
More informationA PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
More informationOptimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
More informationVarious Schemes of Load Balancing in Distributed Systems- A Review
741 Various Schemes of Load Balancing in Distributed Systems- A Review Monika Kushwaha Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Saurabh Gupta Pranveer Singh Institute
More informationKeywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationTowards a Content Delivery Load Balance Algorithm Based on Probability Matching in Cloud Storage
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 2211-2217 2211 Open Access Towards a Content Delivery Load Balance Algorithm Based on Probability
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationSuper-Consumer Based Reputation Management for Web Service Systems
Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract
More informationContent Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
More informationLoad Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
More informationA Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationA Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
More informationCHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT
81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationEntropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationA Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service
A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service Payal Malekar 1, Prof. Jagruti S. Wankhede 2 Student, Information Technology,
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationA Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
Journal of Information & Computational Science 9: 16 (2012) 4801 4809 Available at http://www.joics.com A Method of Cloud Resource Load Balancing Scheduling Based on Improved Adaptive Genetic Algorithm
More informationA B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION
Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India
More informationDynamic Adaptive Feedback of Load Balancing Strategy
Journal of Information & Computational Science 8: 10 (2011) 1901 1908 Available at http://www.joics.com Dynamic Adaptive Feedback of Load Balancing Strategy Hongbin Wang a,b, Zhiyi Fang a,, Shuang Cui
More informationA Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationComparison on Different Load Balancing Algorithms of Peer to Peer Networks
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks K.N.Sirisha *, S.Bhagya Rekha M.Tech,Software Engineering Noble college of Engineering & Technology for Women Web Technologies
More informationAchieving Resilient and Efficient Load Balancing in DHT-based P2P Systems
Achieving Resilient and Efficient Load Balancing in DHT-based P2P Systems Di Wu, Ye Tian and Kam-Wing Ng Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, N.T., Hong
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationCLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
More informationA Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
More informationLoad Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity
Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,
More informationA NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
More informationBandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
More informationA Novel Distributed Wireless VoIP Server Based on SIP
A Novel Distributed Wireless VoIP Server Based on SIP Yuebin Bai 1,Syed Aminullah 1, Qingmian Han 2, Ding Wang 1, Tan Zhang 1,and Depei Qian 1 1 (School of Computer Science and Engineering, Beihang University,
More informationADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
More informationImproved Hybrid Dynamic Load Balancing Algorithm for Distributed Environment
International Journal of Scientific and Research Publications, Volume 3, Issue 3, March 2013 1 Improved Hybrid Dynamic Load Balancing Algorithm for Distributed Environment UrjashreePatil*, RajashreeShedge**
More informationArchitectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices
Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope
More informationDesign and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm
Design and Implementation of Performance Guaranteed Symmetric Load Balancing Algorithm Shaik Nagoor Meeravali #1, R. Daniel *2, CH. Srinivasa Reddy #3 # M.Tech, Department of Information Technology, Vignan's
More information