RTPC

Comparison of Various Load Balancing Algorithms in Cloud Computing

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Ayushi Bhargava, Manish Bhardwa,

[/foreach]
nJanuary 9, 2023 at 5:51 am

n

nAbstract

n

The components associated with distributed computing are customers, datacenter and appropriated server. One of the principal issuesin distributed computing isload adjusting. Adjusting the heap intends to circulate the outstanding task at hand among a few hubs uniformly so no single hub will be over- burden. Burden can be of any kind that is it very well may be CPU load, memory limit or system load. Right now, introduced a design of burden adjusting and calculation which will additionally improve the heap adjusting issue by limiting the reaction time. Right now, have proposed the improved variant of existing managed load adjusting approach for distributed computing by comping the Randomization and covetous burden adjusting calculation. To check the presentation of proposed approach, we have utilized the cloud investigator test system (Cloud Analyst). Through reenactment examination, it has been discovered that proposed improved form of controlled burden adjusting approach has indicated better execution as far as cost, reaction time and information preparing time.

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a02 | Received :u00a0u00a0September 30, 2021 | Accepted :u00a0u00a0October 22, 2021 | Published :u00a0u00a0November 20, 2021n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue Comparison of Various Load Balancing Algorithms in Cloud Computing under section in Recent Trends in Parallel Computing(rtpc)] [/if 424]
Keywords CC–Cloud Computing, CA–Cloud Analyst, GA–genetic algorithm, ACO–ant colony optimization, SHC–stochastic algorithm, FCFS–first come first serve

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. Zhong Xu, Rong Huang, (2009) “Performance Study of Load Balancing Algorithms in Distributed Web Server Systems”, CS213 Parallel and Distributed Processing Project Report.
2. P. Warstein, H. Situ and Z. Huang (2010), “Load balancing in a cluster computer” In proceeding of the seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE.
3. Ms. Nitika, Ms. Shaveta, Mr. Gaurav Raj; “Comparative Analysis of Load Balancing Algorithms in Cloud Computing”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012.
4. Y. Fang, F. Wang, and J. Ge, “A Task Scheduling Algorithm Based on Load Balancing in Cloud Computing”, Web Information Systems and Mining, Lecture Notes in Computer Science, Vol. 6318, 2010, pages 271–277.
5. T.R.V. Anandharajan, Dr. M.A. Bhagyaveni” Co-operative Scheduled Energy Aware Load- Balancing technique for an Efficient Computational Cloud” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
6. T. Kokilavani J.J. College of Engineering & Technology and Research Scholar, Bharathiar University, Tamil Nadu, India” Load Balanced Min-Min Algorithm for Static Meta-Task Scheduling in Grid Computing” International Journal of Computer Applications (0975–8887) Volume 20–No. 2, April 2011.
7. Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication 800–145, September 2011.
8. Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanzadeh, Christopher Mcdermid (2011) “Availabity and Load Balancing in Cloud Computing” International Conference on Computer and Software Modeling IPCSIT vol.14 IACSIT Press, Singapore 2011.
9. A. Khiyaita, M. Zbakh, H. El Bakkali and Dafir El Kettani, “Load Balancing Cloud Computing: State of Art”, 9778-1-4673-1053-6/12/$31.00, 2012 IEEE.
10. Wayne Jansen Timothy Grance” Guidelines on Security and Privacy in Public Cloud Computing” NIST Draft Special Publication 800–144.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Editors Overview

rtpc maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Ayushi Bhargava, Manish Bhardwa

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Assistant Professor,Department of Computer Science & Engineering, Poornima Institute of Engineering & Technology, Jaipur, Department of Computer Science & Engineering, Poornima Institute of Engineering & Technology, Jaipur,Rajasthan, Rajasthan,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nThe components associated with distributed computing are customers, datacenter and appropriated server. One of the principal issuesin distributed computing isload adjusting. Adjusting the heap intends to circulate the outstanding task at hand among a few hubs uniformly so no single hub will be over- burden. Burden can be of any kind that is it very well may be CPU load, memory limit or system load. Right now, introduced a design of burden adjusting and calculation which will additionally improve the heap adjusting issue by limiting the reaction time. Right now, have proposed the improved variant of existing managed load adjusting approach for distributed computing by comping the Randomization and covetous burden adjusting calculation. To check the presentation of proposed approach, we have utilized the cloud investigator test system (Cloud Analyst). Through reenactment examination, it has been discovered that proposed improved form of controlled burden adjusting approach has indicated better execution as far as cost, reaction time and information preparing time.n

n

n

Keywords: CC–Cloud Computing, CA–Cloud Analyst, GA–genetic algorithm, ACO–ant colony optimization, SHC–stochastic algorithm, FCFS–first come first serve

n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Recent Trends in Parallel Computing(rtpc)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. Zhong Xu, Rong Huang, (2009) “Performance Study of Load Balancing Algorithms in Distributed Web Server Systems”, CS213 Parallel and Distributed Processing Project Report.
2. P. Warstein, H. Situ and Z. Huang (2010), “Load balancing in a cluster computer” In proceeding of the seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, IEEE.
3. Ms. Nitika, Ms. Shaveta, Mr. Gaurav Raj; “Comparative Analysis of Load Balancing Algorithms in Cloud Computing”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012.
4. Y. Fang, F. Wang, and J. Ge, “A Task Scheduling Algorithm Based on Load Balancing in Cloud Computing”, Web Information Systems and Mining, Lecture Notes in Computer Science, Vol. 6318, 2010, pages 271–277.
5. T.R.V. Anandharajan, Dr. M.A. Bhagyaveni” Co-operative Scheduled Energy Aware Load- Balancing technique for an Efficient Computational Cloud” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011.
6. T. Kokilavani J.J. College of Engineering & Technology and Research Scholar, Bharathiar University, Tamil Nadu, India” Load Balanced Min-Min Algorithm for Static Meta-Task Scheduling in Grid Computing” International Journal of Computer Applications (0975–8887) Volume 20–No. 2, April 2011.
7. Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing”, NIST Special Publication 800–145, September 2011.
8. Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanzadeh, Christopher Mcdermid (2011) “Availabity and Load Balancing in Cloud Computing” International Conference on Computer and Software Modeling IPCSIT vol.14 IACSIT Press, Singapore 2011.
9. A. Khiyaita, M. Zbakh, H. El Bakkali and Dafir El Kettani, “Load Balancing Cloud Computing: State of Art”, 9778-1-4673-1053-6/12/$31.00, 2012 IEEE.
10. Wayne Jansen Timothy Grance” Guidelines on Security and Privacy in Public Cloud Computing” NIST Draft Special Publication 800–144.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Recent Trends in Parallel Computing

n

[if 344 not_equal=””]ISSN: 2393-8749[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 2
Received September 30, 2021
Accepted October 22, 2021
Published November 20, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More
RTPC

A Study of Virtual Machines Environment in Cloud Computing

[{“box”:0,”content”:”

n

n

 > 

n

n

 > 

n

n

n

n

n

n

n

By [foreach 286]u00a0

u00a0Nikita Lakhmera, Amit Kumar Gupta, Priya Mathur,

[/foreach]
nJanuary 9, 2023 at 5:46 am

n

nAbstract

n

The Cloud computing is most widely used technological concept which gives the efficient result in concern to availability and utilizing of resources, processing and management of the data on servers. These capabilities make cloud computing to decorate the programs of it. The concept of virtualization of cloud computing is main feature of this technology which provide a platform to many business application data, academic IT tools and industry to explore their data which can be easily available to end users. The time period sources may be represented as network, server, storage, utility and client. Virtual machines are picking up prevalence step by step and being embraced broadly over the globe. Right now, attempt to comprehend the usefulness of the hypervisor and its applications. We will investigate the ongoing inquiries in the field of the hypervisor to perceive what more changes it can have later on and challenges for those changes. We will likewise perceive how we can utilize virtualization through hypervisors to make sure about our servers and take care of security issues.

n

n

n

n

Volume :u00a0u00a08 | Issue :u00a0u00a02 | Received :u00a0u00a0August 22, 2021 | Accepted :u00a0u00a0November 15, 2021 | Published :u00a0u00a0November 26, 2021n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)] [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue A Study of Virtual Machines Environment in Cloud Computing under section in Recent Trends in Parallel Computing(rtpc)] [/if 424]
Keywords Servers, hypervisor, security, virtual machine, cloud computing, resources

n

n

n

n

n


n[if 992 equals=”Transformative”]

n

n

Full Text

n

n

n

[/if 992][if 992 not_equal=”Transformative”]

n

n

Full Text

n

n

n

[/if 992] n


nn

[if 379 not_equal=””]n

[foreach 379]n

n[/foreach]

n[/if 379]

n

References

n[if 1104 equals=””]n

1. VMware. (2009). History of virtualization. DOI= http://www.vmware.com/virtualization/history.html.
2. Mell, P., Grance, T., & Grance, T. (n.d.). The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology.
3. Ramos, S.J.C.C. 2009). Security Challenges with Virtualization. Thesis, December 2009, DOI =http: // docs. di .fc.ul. pt/jspui/bitstream / 10455/3282/1/Thesis – Jramos FCUL.pdf.
4. Tan, S. (2010). Forecast: Understanding the Opportunities in Virtualization Consulting and Implementation Services. Gartner. Publication Date: 11 March 2010, ID Number: G00174840
5. Chowdhury, M. K.; Boutaba, R. (2009). A survey of network virtualization. Elsevier. Computer Network 54(2010) 862–876.
6. Goldberg, R.P. (1974). Survey of virtual machine research. Computer, pages 34–45, 1974
7. Ray, E.; Schultz E. (2009). Virtualization security. ACM International Conference Proceeding Series, art. no. 42.
8. Bittman, T.J. (2008). Server virtualization trends in 2008: Everything changes. Gartner. 11 March 2008.
9. Murphy, A. Virtualization defined – eight different ways. White paper. DOI=http://www.f5.com/pdf/white papers /virtualization – defined-wp.pdf.
10. Cloud Computing Use Cases Discussion Group, “Cloud Computing White Paper”, 30 October 2009.
11. Devanathan Nandhagopal, Nithin Mohan, Sai Manoj Kumar Ravichandran, and Shilp Malpani. “”VMware and Xen Hypervisor Performance Comparisons in Thick and Thin Provisioned Environments.””
12. Spruijt, R. (2010). Desktop virtualization and the power of App-V and Windows DOI= http: //www. brianmadden. com/blogs/rubenspruijt/archive/2010/02/22/desktop-virtualizationand-the- power-of-windows-7.aspx.
13. MacDonald, N. (2010). Addressing the most common security risks in data center virtualization projects. Gartner. 25 January 2010.
14. Singh, Bohar, and Pawan Luthra. “”Review of Linpack and Cloudsimon VMM.””arXiv preprint arXiv:1405.6490 (2014).
15. VMware Inc., “Understanding Full Virtualization, Paravirtualization and Hardware Assist”, White paper, 2007.
16. Mohan, A., & Shine, S. (2013). “Survey on Live VM Migration Techniques”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), pp-155.
17. Che, J., He, Q., Gao, Q., & Huang, D., “Performance measuring and comparing of virtual machine monitors”. In Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on (Vol. 2, pp. 381- 386). IEEE, (2008, December).
18. Groenhuis, R.; Smith, J. (2010). Transform the Management of Your Virtualized Datacenter. Presentation VMware Forum 2010 Nijkerk. VMware.
19. Schumate, S. (2004). Implications of Virtualization. Technical Report 2004. DOI = www. dell.com/downloads/ global/power/ps4q04-20040152-Shumate.pdf.

nn[/if 1104] [if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””], [/if 1106]
  2. n[/foreach]

n[/if 1104]

n[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=”Regular Issue”] Regular Issue[/if 424] Open Access Article

n

Editors Overview

rtpc maintains an Editorial Board of practicing researchers from around the world, to ensure manuscripts are handled by editors who are experts in the field of study.

n

“},{“box”:4,”content”:”

n“},{“box”:1,”content”:”

    By  [foreach 286]n

  1. n

    Nikita Lakhmera, Amit Kumar Gupta, Priya Mathur

    n

  2. [/foreach]

n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Student, Associate Professor,Department of Computer Science and Engineering, Poornima Institute of Engineering and Technology, Department of Computer Science and Engineering, Amity University, Jaipur,Rajasthan, Rajasthan,India, India
  2. n[/if 1175][/foreach]

n

n

n

n

n

Abstract

nThe Cloud computing is most widely used technological concept which gives the efficient result in concern to availability and utilizing of resources, processing and management of the data on servers. These capabilities make cloud computing to decorate the programs of it. The concept of virtualization of cloud computing is main feature of this technology which provide a platform to many business application data, academic IT tools and industry to explore their data which can be easily available to end users. The time period sources may be represented as network, server, storage, utility and client. Virtual machines are picking up prevalence step by step and being embraced broadly over the globe. Right now, attempt to comprehend the usefulness of the hypervisor and its applications. We will investigate the ongoing inquiries in the field of the hypervisor to perceive what more changes it can have later on and challenges for those changes. We will likewise perceive how we can utilize virtualization through hypervisors to make sure about our servers and take care of security issues.n

n

n

Keywords: Servers, hypervisor, security, virtual machine, cloud computing, resources

n[if 424 equals=”Regular Issue”][This article belongs to Recent Trends in Parallel Computing(rtpc)]

n[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Recent Trends in Parallel Computing(rtpc)] [/if 424]

n

n

n


n[if 992 equals=”Transformative”]n

n

n

Full Text

n

n

nn[/if 992]n[if 992 not_equal=”Transformative”]n

n

Full Text

n

n

n

n


[/if 992]n[if 379 not_equal=””]

Browse Figures

n

n

[foreach 379]n

n[/foreach]

n

[/if 379]n

n

References

n[if 1104 equals=””]

1. VMware. (2009). History of virtualization. DOI= http://www.vmware.com/virtualization/history.html.
2. Mell, P., Grance, T., & Grance, T. (n.d.). The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology.
3. Ramos, S.J.C.C. 2009). Security Challenges with Virtualization. Thesis, December 2009, DOI =http: // docs. di .fc.ul. pt/jspui/bitstream / 10455/3282/1/Thesis – Jramos FCUL.pdf.
4. Tan, S. (2010). Forecast: Understanding the Opportunities in Virtualization Consulting and Implementation Services. Gartner. Publication Date: 11 March 2010, ID Number: G00174840
5. Chowdhury, M. K.; Boutaba, R. (2009). A survey of network virtualization. Elsevier. Computer Network 54(2010) 862–876.
6. Goldberg, R.P. (1974). Survey of virtual machine research. Computer, pages 34–45, 1974
7. Ray, E.; Schultz E. (2009). Virtualization security. ACM International Conference Proceeding Series, art. no. 42.
8. Bittman, T.J. (2008). Server virtualization trends in 2008: Everything changes. Gartner. 11 March 2008.
9. Murphy, A. Virtualization defined – eight different ways. White paper. DOI=http://www.f5.com/pdf/white papers /virtualization – defined-wp.pdf.
10. Cloud Computing Use Cases Discussion Group, “Cloud Computing White Paper”, 30 October 2009.
11. Devanathan Nandhagopal, Nithin Mohan, Sai Manoj Kumar Ravichandran, and Shilp Malpani. “”VMware and Xen Hypervisor Performance Comparisons in Thick and Thin Provisioned Environments.””
12. Spruijt, R. (2010). Desktop virtualization and the power of App-V and Windows DOI= http: //www. brianmadden. com/blogs/rubenspruijt/archive/2010/02/22/desktop-virtualizationand-the- power-of-windows-7.aspx.
13. MacDonald, N. (2010). Addressing the most common security risks in data center virtualization projects. Gartner. 25 January 2010.
14. Singh, Bohar, and Pawan Luthra. “”Review of Linpack and Cloudsimon VMM.””arXiv preprint arXiv:1405.6490 (2014).
15. VMware Inc., “Understanding Full Virtualization, Paravirtualization and Hardware Assist”, White paper, 2007.
16. Mohan, A., & Shine, S. (2013). “Survey on Live VM Migration Techniques”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), pp-155.
17. Che, J., He, Q., Gao, Q., & Huang, D., “Performance measuring and comparing of virtual machine monitors”. In Embedded and Ubiquitous Computing, 2008. EUC’08. IEEE/IFIP International Conference on (Vol. 2, pp. 381- 386). IEEE, (2008, December).
18. Groenhuis, R.; Smith, J. (2010). Transform the Management of Your Virtualized Datacenter. Presentation VMware Forum 2010 Nijkerk. VMware.
19. Schumate, S. (2004). Implications of Virtualization. Technical Report 2004. DOI = www. dell.com/downloads/ global/power/ps4q04-20040152-Shumate.pdf.

n[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

n


n[if 1114 equals=”Yes”]n

n[/if 1114]”},{“box”:2,”content”:”

Regular Issue Open Access Article

n

n

n

n

n

Recent Trends in Parallel Computing

n

[if 344 not_equal=””]ISSN: 2393-8749[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

Volume 8
Issue 2
Received August 22, 2021
Accepted November 15, 2021
Published November 26, 2021

n

n

n

n

Editor

n

n


n

Reviewer

n

n


n n

n”},{“box”:6,”content”:”“}]

Read More