THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN. Ilyong Chung and Yongeun Bae. 1. Introduction
|
|
|
- Griffin Allison
- 9 years ago
- Views:
Transcription
1 J. Appl. Math. & Computing Vol. 14(2004), No. 1-2, pp THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN Ilyong Chung and Yongeun Bae Abstract. In order to maintain load balancing in a distributed system, we should obtain workload information from all the nodes on network. This processing requires O(v 2 ) communication overhead, where v is the number of nodes. In this paper, we present a new synchronous dynamic distributed load balancing algorithm on a (v, k + 1, 1)-configured network applying a symmetric balanced incomplete block design, where v = k 2 + k + 1. Our algorithm needs only O(v v) communication overhead and each node receives workload information from all the nodes without redundancy. Therefore, load balancing is maintained since every link has the same amount of traffic for transferring workload information. AMS Mathematics Subject Classification : 68Q25 Key words and phrases : Load balancing, block design 1. Introduction In a distributed system it is likely that some processors are heavily loaded while some are lightly loaded or idle. It is desirable that workload be balanced between these processors so that utilization of processors can be increased and response time can be reduced. A load balancing scheme[1]-[2] determines whether a task should be executed locally or by a remote processor. This decision can be made in a centralized or distributed manner. In a distributed system, distributed manner is recommended. In order to make this decision, each node can be informed about the workload information of other nodes. Also this information should be the latest because outdated information may cause an inconsistent view of the system state. So disseminating load information may incur a high link cost or a significant communication traffic overhead. In order to decrease communication overhead for obtaining workload information, the message is exchanged between adjacent Received July 11, c 2004 korean Society for Computational & Applied Mathematics and Korean SIGCAM. 343
2 344 Ilyong Chung and Yongeun Bae nodes and local load-balancing process is performed repeatedly. Then it makes the whole system be load-balancing[3]-[4]. It is accomplished by employing CWA(Cube Walking Algorithm) on hypercube network, which utilizes workload information of all the nodes. This method requires O(v 2 ) communication complexity and a communication path is O(log 2 v). To reduce communication cost, flooding scheme is applied. However, the overlap of transmitting information occurs[5]-[6]. Based on SBN(Symmetric Broadcast Networks), communication patterns between nodes are constructed. It also needs O(v 2 ) communication complexity for collecting workload information from all the nodes and a communication path is O(log 2 v)[7]-[8]. In this paper we present the network topology consisting of v nodes and v k links and each node of which is linked to 2k nodes, where v = k 2 +k +1. On this network, each node sends workload information of k nodes to k adjacent nodes periodically. In other words, each node receives information from k nodes and sends information to k nodes. Also there is no redundancy in this received information. So, each node receives workload information for k 2 +k nodes with two round message interchange. Therefore load balancing in this algorithm is maintained so that every link has has the same amount of traffic. 2. About (v,k, λ )-configuration Let V = {0,1,...,v 1} be a set of v elements. Let B = {B 0,B 1,..., B b 1 } be a set of b blocks, where B i is a subset of V and B i = k. For a finite incidence structure σ = {V,B},ifσ satisfies following conditions, then it is a balanced incomplete block design(bibd)[9], which is called a (b,v,r,k,λ)-configuration. 1. B is a collection of bk-subsets of V and these k-subsets are called the blocks. 2. Each element of V is related with exactly r of b blocks. 3. Every two objects of V appears simultaneously in exactly λ of b blocks. 4. k<v For a(b,v,r,k,λ)-configuration, if it satisfies k = r and b = v, then it is a symmetric balanced incomplete block design (SBIBD)[10] and it is called a (v, k, λ)-configuration. There are some relations among parameters b,v,r,k,λ that are necessory conditions for existence of this configuration, bk = vr and r(k 1) = λ(v 1). 3. Generation of a (v,k+1,1)-configuration
3 The design of an efficient load balancing algorithm 345 We now present an algorithm to generate an incidence structure σ = {V,B} satisfying the condition for a (v, k +1, 1)-configuration in the case that k is a prime number. This (v, k + 1, 1) -configuration is employed for constructing network topology below Design of an algorithm to construct (v,k+1, 1)-configuration Algorithm 1 for Generating an incidence structure. Incidence structure T = {V,B}, where V = {0,1,...,v 1}, B = {B 0,B 1,..., B b 1 }, B i = k +1. B i,j is the j th element of B i 1. Select a prime number k and compute v = k 2 + k Construct two incidence structures X = {V,C} and Y = {V,D}. (a) C i,j, 0 i, j k, has a value as following. { 0 if j =0 C i,j = t, t = i k + j if j 1 (b) D i,j, 0 i (k 2 1), 0 j k, has a value as following. { C0,t, t = i/k +1 if j =0 D i,j = C j,t, t =(i +(j 1) i/k ) mod k +1 if j 1 3. Generate Z = {V,B} from X and Y. B i C i B i+k+1 D i The table below illustrates how to create Z = {V, B}, V = {0, 1,..., 6}. We now prove that this structure satisfies the conditions of a (v, k +1, 1)-configuration.
4 346 Ilyong Chung and Yongeun Bae TABLE 1. A set of blocks on Z generated from algorithm 1 X Y Z B 0 = { 0, 1, 2 } D 0 = { 1, 3, 5 } B 1 = { 0, 3, 4 } C 0 = { 0, 1, 2 } D 1 = { 1, 4, 6 } B 2 = { 0, 5, 6 } C 1 = { 0, 3, 4 } D 2 = { 2, 3, 6 } B 3 = { 1, 3, 5 } C 2 = { 0, 5, 6 } D 3 = { 2, 4, 5 } B 4 = { 1, 4, 6 } B 5 = { 2, 3, 6 } B 6 = { 2, 4, 5 } Definition 1. On incidence structure Y, Sector S i is the i th family of k blocks, D j S i, i = j/k. For example, if k equals 3, then 0/k = 1/k = 2/k = 0. So, S 0 = {D 0,D 1,D 2 }. There are k sectors in Y. Lemma 1. For two elements D i1,j1 and D i2,j2, D i1,j1 D i2,j2, if j1 j2. P roof. From Algorithm 1-2-(a), if 0 <j k, 0 i k then C i,j = i k+j. This means if j>0 then all the elements are distinct. And as shown in Algorithm 1-2-(b), an element of C j is placed on j th element of a certain block of Y if D i,j = C j,t,t 0. Lemma 2. For a sector consisting of k blocks, the first element of each block has the same value and the other k 2 elements are equal to V C 0. P roof. In the case that D i,0 = C 0, i/k +1], the first element of k blocks on a sector have the same value. According to Algorithm 1-2-(b), D i,j = C j,t,t = (i +(j 1) i/k ) mod k + 1. Since k is a prime number, each element except the first element of each block is distinct and these distinct k 2 elements are equal to V C 0. Lemma 3. For incidence structure Y, D a,j = D b,j,j 1,ifb =((a c(j 1)) mod k + k( a/k + c)) mod k 2. P roof. From Algorithm 1-2-(b), D a,j = C j,t. We now prove that D b,j = C j,t. t can be calculated from parameters b, j below. Then t obtained on this lemma is equal to that from Algorithm 1-2-(b). Therefore, D a,j = D b,j. t =(b +(j 1) b/k ) mod k +1 = (((a c(j 1)) mod k +k( a/k +c))+(j 1) ((a c(j 1)) mod k +
5 The design of an efficient load balancing algorithm 347 k( a/k + c))/k ) mod k +1 = (((a c(j 1)) + (j 1) ( a/k + c) mod k +1 =(a +(j 1) a/k ) mod k +1 Here, if D a,j is in sector S s then D b,j is in S (s+c) mod k. In case of c 0(mod k), then a = b. Lemma 4. Each element of V appears in exactly k + 1 times in Z. P roof. According to Algorithm 1-2-(a), C i,0 = 0. Since 0 i k, 0 appears k + 1 times. The other v 1 elements, V {0}, appear exactly once on X. From Lemma 3, each element of C 0,j, 1 j k appears k times in a sector of Y and the rest k 2 elements appear once in every sector of Y. Therefore, each element appears k + 1 times in Z. Lemma 5. Any pair of elements of V appears in exactly only once in Z. P roof. The first element of V makes a pair with all the other elements and this pair appears once by designing rule of incidence structure(see Algorithm 1-2-(a)). Each elements of C 0,j, 1 j k makes a pair with V C 0 elements and it also appears once proven by Lemma 3. The rest k 2 elements are now considered. For an arbitrary pair D a,j1 = D a,j2,j1,j2 1, in order to make the same pair on other block D b, the two elements should be on the same block. According to Lemma 4, if j1 =j2, then they are located on D b. However, this case does not occur since j1 j2. Therefore, any pair of elements of V appears in exactly only one time in Z. Therorem 1. Z designed by Algorithm 1 satisfies the conditions of a (v, k+1, 1)- configuration. P roof. Z satisfied the conditions of the SBIBD by emplying Lemma 4 and Lemma Design of Network Configuration In order to construct a network topology which have minimum link cost and traffic overhead, we imported (v, k + 1, 1)-configuration. An incidence structure Z = {V,B} satifies the conditions for a (v, k +1, 1)-configuration and M be a binary incidence matrix of Z. Then this matrix M can be transformed to an
6 348 Ilyong Chung and Yongeun Bae adjacent matrix of a graph G = {V,E}. Based on this idea, network topology can be designed as follows. Algorithm 2 for design of network configuration 1. Create an incidence structure Z = {V,B} by Algoritm Generate L = {V,E} from Z by exchanging blocks so that every block i includes object i. E 0 B 0 for ( i =1 ; i<v ; i = i +1 ) { if ( i k ) { j i k +1 ; t B j,i } else if ( i mod k =1 ){t B i,0 } else {j i/k 1 ; t B i,j } E t B i } 3. Create an adjacent matrix A =(a ij ) for graph G from L, where G is a network topology containing v processors { 1 if i j and if i Ej or j E i a i,j = 0 otherwise G has v nodes since G is created from (v, k +1, 1)-configuration. Each block L[i] is composed of k + 1 elements and i is the one of them. Each node obtains 2k links from Step 3 of Algorithm 2. So, G become a 2k-regular graph. therefore there are (2k v)/2 =vk links in G. Given Z = {V,B} described on Fig.1, performance of Algorithm 2 is shown on Table 2 and Fig.1. TABLE 2. Blocks of L generated from Z of Table 1 L E 0 = { 0, 1, 2 } E 1 = { 1, 3, 5 } E 2 = { 2, 3, 6 } E 3 = { 0, 3, 4 } E 4 = { 1, 4, 6 } E 5 = { 2, 4, 5 } E 6 = { 0, 5, 6 } 4. Design of an Efficient Load Balancing Algorithm on (v,k+1,1)- configured networks
7 The design of an efficient load balancing algorithm 349 An efficient load balancing algorithm is now constructed on (v,k+1,1)-configured networks generated by Algorithm 2. FIGURE 1. (7,3,1)-configured network obtained from L Definition 2. Construct two sets S i and R i consisting of adjacent k nodes, where S i is a set of nodes to which node i sends workload information and R i is a set of nodes to receive i s workload information. S i =v v E i i} R i =v E v & i v} Definition 3. Generate two sets SF i and RF i, where SF i (j) is a set of workload information for i s adjacent nodes transmitted from node i to node j at time T 2t and RF i (j) isi s workload information transmitted from node i to node j at time T 2t+1. SF i = {SF i (j) j S i, SF i (j) ={E i {j}}. RF i = {RF i (j) j R i, RF i (j) =i}. Algorithm 3 for construction of an efficient load balancing algorithm 1. Node i sends a set of workload information SF i (j) to node j S i at T 2t and renews a table of workload information. 2. Node i sends a set of workload information RF i (j) to node j R i at T 2t+1 and renews a table of workload information. 3. Repeat the first step.
8 350 Ilyong Chung and Yongeun Bae The following table indicates that node i sends workload information SF i (j) and RF i (j) to node j at times T 2t and T 2t+1, respectively. So every node can obtain workload information for all the nodes at T 2t+2 and this fact is proven in Theorem 2. Theorem 2. According to Algorithm 3, every node obtains workload information for all the nodes at T 2t+2. P roof. At T 2t, node i sends workload information for SF i (j) to node j. On an aritrary pair (SF i1 (j), SF i2 (j)),i1 i2, intersection of these sets is empty since on (v,k+1,1)-configuration, every two objects appears simultaneously in exactly one of v blocks and node j is an element of S i1 and S i2, respectively. So node j obtains workload information for k 2 nodes. And at T 2t+1, node i transmits its workload information to node j by Algorithm 3-2. Then, node j receives k workload information. Therefore, node j receives workload information for k 2 + k nodes at T 2t+2. TABLE 3. Two steps for sending workload information from Node i NodeID T 2t T 2t+1 0 SF 0 (1) = { 0, 2 } SF 0 (2) = { 0, 1 } RF 0 (3)= { 0 } RF 0 (6) = { 0 } 1 SF 1 (3) = { 1, 5 } SF 1 (5) = { 1, 3 } RF 1 (0)= { 1 } RF 1 (4) = { 1 } 2 SF 2 (3) = { 2, 6 } SF 2 (6) = { 2, 3 } RF 2 (0)= { 2 } RF 2 (5) = { 2 } 3 SF 3 (0) = { 3, 4 } SF 3 (4) = { 3, 0 } RF 3 (1)= { 3 } RF 3 (2) = { 3 } 4 SF 4 (1) = { 4, 6 } SF 4 (6) = { 4, 1 } RF 4 (3)= { 4 } RF 4 (5) = { 4 } 5 SF 5 (2) = { 5, 4 } SF 5 (4) = { 5, 2 } RF 5 (1)= { 5 } RF 5 (6) = { 5 } 6 SF 6 (0) = { 6, 5 } SF 6 (5) = { 6, 0 } RF 6 (2)= { 6 } RF 6 (4) = { 6 } 5. Conclusion In order for the system to increase utilization and to reduce response time, workload should be balanced. In this paper, we present an efficient load balancing algorithm on (v, k + 1, 1)-configured networks consisting of v nodes and vk links. Our algorithm needs only O(v v) message overhead and each node receives workload information from all the nodes without redundancy and load balancing is maintained so that every link has same amount of traffic for transferring workload information.
9 The design of an efficient load balancing algorithm 351 References 1. M. Willebeek-Lemair and A. P. Reeves, Strategies for dynamic load-balancing on highly parallel computers, IEEE Transactions on Parallel and Distributed Systems, vol. 4, no. 9, pp , B.A. Shirazi, Scheduling and load balancing in parallel and distributed systems, IEEE Computer Society Press, S. Hosseini, B. Litow, M. Malkawi, Analysis of a graph coloring based distributed load balancing algorithm, Journal of Parallel and Distributed Computing, vol. 10, no. 2, pp , C.Hui, S.Chanson, Hydrodynamic Load Balancing, IEEE Transactions on Parallel and Distributed System, vol. 10, no. 11, pp , K. Nam, J. Seo, Synchronous Load balancing in Hypercube Multicomputers with Faulty Nodes, Journal of Parallel and Distributed Computing, vol. 58, pp , H. Rim, J. Jang, Method for Maximal Utilization of Idle links for Fast Load Balancing, Journal of Korea Information Processing Society, vol. 28, no. 12, S. Das, D. Harvey, and R. Biswas, Adaptive Load-Balancing Algorithms Using Symmetric Broadcast Networks, NASA Ames Research Center, TR NAS , May S. Das, D. Harvey, and R. Biswas, Parallel Processing of Adaptive Meshes with Load Balancing, IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 12, C.L.Liu, Block Designs in Introduction to Combinatorial Mathematics, McGraw-Hill, pp , I. Chung, W. Choi, Y. Kim, M. Lee, The Design of conference key distribution system employing a symmetric balanced incomplete block design, Information Processing Letters, vol. 81, no. 6, pp , Ilyong Chung received the B.E. degree from Hanyang University, Seoul, Korea, in 1983 and the M.S. and Ph.D. degrees in Computer Science from City University of New York, New York, in 1987 and 1991, respectively. From 1991 to 1994, he was a senior technical staff of Electronics and Telecommunication Research Institute(ETRI), Daejon, Korea. Since 1994, he has been an Associate Professor in Department of Computer Science, Chosun Univeristy, Kwangju, Korea. His research interests are in computer networking, security systems and coding theory. Department of Computer Engineering, Chosun University, Kwangju, Korea [email protected] Youngeun Bae received the B.S. and M.S. degrees in computer science from Chosun University, Kwangju, Korea in 1984 and 1986, respectively and Ph.D. degree from Wonkwang University, Korea in Since 1987, he has been an Associate Professor in Department of Computer Science, Chosun Univeristy, Kwangju, Korea. His research interests are in Parallel processing and security systems. Department of Computer Engineering, Chosun University, Kwangju, Korea [email protected]
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 1213-1229 (2004) Short Paper Novel Hierarchical Interconnection Networks for High-Performance Multicomputer Systems GENE EU JAN, YUAN-SHIN HWANG *, MING-BO
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Load balancing in a heterogeneous computer system by self-organizing Kohonen network
Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List Mehmet Kurt 1, Can Atilgan 2, Murat Ersen Berberler 3 1 Izmir University, Department of Mathematics and Computer Science, Izmir
Modeling and Performance Evaluation of Computer Systems Security Operation 1
Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system
IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 6 June, 2013 Page No. 1914-1919 IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES Ms.
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture
A Robust Dynamic Load-balancing Scheme for Data Parallel Application on Message Passing Architecture Yangsuk Kee Department of Computer Engineering Seoul National University Seoul, 151-742, Korea Soonhoi
Load Balancing between Computing Clusters
Load Balancing between Computing Clusters Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, NL 3C5 e-mail: [email protected] Ada Wai-Chee Fu Dept. of Computer
Generating Elementary Combinatorial Objects
Fall 2009 Combinatorial Generation Combinatorial Generation: an old subject Excerpt from: D. Knuth, History of Combinatorial Generation, in pre-fascicle 4B, The Art of Computer Programming Vol 4. Combinatorial
System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1
System Interconnect Architectures CSCI 8150 Advanced Computer Architecture Hwang, Chapter 2 Program and Network Properties 2.4 System Interconnect Architectures Direct networks for static connections Indirect
A Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
Efficient Data Replication Scheme based on Hadoop Distributed File System
, pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,
A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service
A Review on an Algorithm for Dynamic Load Balancing in Distributed Network with Multiple Supporting Nodes with Interrupt Service Payal Malekar 1, Prof. Jagruti S. Wankhede 2 Student, Information Technology,
Scalability and Classifications
Scalability and Classifications 1 Types of Parallel Computers MIMD and SIMD classifications shared and distributed memory multicomputers distributed shared memory computers 2 Network Topologies static
Load balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors
Journal of omputational Information Systems 7:2 (2011) 623-630 Available at http://www.jofcis.com Fault-Tolerant Routing Algorithm for BSN-Hypercube Using Unsafety Vectors Wenhong WEI 1,, Yong LI 2 1 School
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
Load Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection 1 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
Load Balancing Techniques
Load Balancing Techniques 1 Lecture Outline Following Topics will be discussed Static Load Balancing Dynamic Load Balancing Mapping for load balancing Minimizing Interaction 2 1 Load Balancing Techniques
Social Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,
Dynamic Multi-User Load Balancing in Distributed Systems
Dynamic Multi-User Load Balancing in Distributed Systems Satish Penmatsa and Anthony T. Chronopoulos The University of Texas at San Antonio Dept. of Computer Science One UTSA Circle, San Antonio, Texas
MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints
Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
Introduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France [email protected] November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks
A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA [email protected]
A STUDY OF TASK SCHEDULING IN MULTIPROCESSOR ENVIROMENT Ranjit Rajak 1, C.P.Katti 2, Nidhi Rajak 3
A STUDY OF TASK SCHEDULING IN MULTIPROCESSOR ENVIROMENT Ranjit Rajak 1, C.P.Katti, Nidhi Rajak 1 Department of Computer Science & Applications, Dr.H.S.Gour Central University, Sagar, India, [email protected]
Single machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
Graph Theory Applications in Network Security
Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) [email protected]
MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS
MEASURING PERFORMANCE OF DYNAMIC LOAD BALANCING ALGORITHMS IN DISTRIBUTED COMPUTING APPLICATIONS Priyesh Kanungo 1 Professor and Senior Systems Engineer (Computer Centre), School of Computer Science and
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Byte-index Chunking Algorithm for Data Deduplication System
, pp.415-424 http://dx.doi.org/10.14257/ijsia.2013.7.5.38 Byte-index Chunking Algorithm for Data Deduplication System Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2 and Young Woong Ko
Experiments on the local load balancing algorithms; part 1
Experiments on the local load balancing algorithms; part 1 Ştefan Măruşter Institute e-austria Timisoara West University of Timişoara, Romania [email protected] Abstract. In this paper the influence
A Survey on Load Balancing and Scheduling in Cloud Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 7 December 2014 ISSN (online): 2349-6010 A Survey on Load Balancing and Scheduling in Cloud Computing Niraj Patel
DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH
DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH P.Neelakantan Department of Computer Science & Engineering, SVCET, Chittoor [email protected] ABSTRACT The grid
GENERATING SETS KEITH CONRAD
GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors
Network File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Performance Comparison of Dynamic Load-Balancing Strategies for Distributed Computing
Performance Comparison of Dynamic Load-Balancing Strategies for Distributed Computing A. Cortés, A. Ripoll, M.A. Senar and E. Luque Computer Architecture and Operating Systems Group Universitat Autònoma
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
All trees contain a large induced subgraph having all degrees 1 (mod k)
All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
Load Balancing and Termination Detection
Chapter 7 slides7-1 Load Balancing and Termination Detection slides7-2 Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume
, pp. 201-210 http://dx.doi.org/10.14257/ijseia.2015.9.2.17 Adaptive Load Balancing Method Enabling Auto-Specifying Threshold of Node Load Status for Apache Flume UnGyu Han and Jinho Ahn Dept. of Comp.
Finding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Fast Device Discovery for Remote Device Management in Lighting Control Networks
J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in
A Hybrid Load Balancing Policy underlying Cloud Computing Environment
A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349
Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation
Estimation of Unknown Comparisons in Incomplete AHP and It s Compensation ISSN 0386-1678 Report of the Research Institute of Industrial Technology, Nihon University Number 77, 2005 Estimation of Unknown
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
DYNAMIC GRAPH ANALYSIS FOR LOAD BALANCING APPLICATIONS
DYNAMIC GRAPH ANALYSIS FOR LOAD BALANCING APPLICATIONS DYNAMIC GRAPH ANALYSIS FOR LOAD BALANCING APPLICATIONS by Belal Ahmad Ibraheem Nwiran Dr. Ali Shatnawi Thesis submitted in partial fulfillment of
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
8. Matchings and Factors
8. Matchings and Factors Consider the formation of an executive council by the parliament committee. Each committee needs to designate one of its members as an official representative to sit on the council,
RN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Decentralized Dynamic Load Balancing: The Particles Approach
appered in: Information Sciences, Vol 84, Issue 1-2 (May 1995) S 115-128 Decentralized Dynamic Load Balancing: The Particles Approach Hans-Ulrich Heiss Department of Informatics and Automation Technical
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
Load Balancing and Termination Detection
Chapter 7 Slide 1 Slide 2 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
Broadcasting in Wireless Networks
Université du Québec en Outaouais, Canada 1/46 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46 Outline Intro Known Ad hoc
THE last two decades have witnessed an exponential
IEEE JSAC - SAMPLING 2006 1 Practical Beacon Placement for Link Monitoring Using Network Tomography Ritesh Kumar and Jasleen Kaur Abstract Recent interest in using tomography for network monitoring has
On the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel [email protected] Muriel Médard Research Laboratory of Electronics
A novel load balancing algorithm for computational grid
International Journal of Computational Intelligence Techniques, ISSN: 0976 0466 & E-ISSN: 0976 0474 Volume 1, Issue 1, 2010, PP-20-26 A novel load balancing algorithm for computational grid Saravanakumar
Chapter 7 Load Balancing and Termination Detection
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University [email protected] [email protected] ABSTRACT Depending
A Simultaneous Solution for General Linear Equations on a Ring or Hierarchical Cluster
Acta Technica Jaurinensis Vol. 3. No. 1. 010 A Simultaneous Solution for General Linear Equations on a Ring or Hierarchical Cluster G. Molnárka, N. Varjasi Széchenyi István University Győr, Hungary, H-906
