SlideShare a Scribd company logo
RESOURCE SCHEDULING ALGORITHM
BY
SHILPA DAMOR
09bit007
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
AHMEDABAD-382481
April 2013
RESOURCE SCHEDULING ALGORITHM
Seminar
Submitted in partial fulfillment of the requirements
For the degree of
Bachelor of Technology in Information Technology
By
SHILPA DAMOR
09BIT007
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
AHMEDABAD-382481
April 2013
3
Certificate
This is to certify that the Seminar entitled ”RESOURCE SCHEDULING ALGORITHM(CLOUD COM-
PUTING)” submitted by SHILPA DAMOR (09BIT007) , towards the partial fulfillment of the requirements
for the degree of Bachelor of Technology in information technology of Nirma University of Science and Tech-
nology, Ahmedabad is the record of work carried out by him under my supervision and guidance. In my
opinion, the submitted work has reached a level required for being accepted for examination. The results
embodied in this Seminar, to the best of my knowledge, haven’t been submitted to any other university or
institution for award of any degree or diploma.
Prof. preeti kathiria, Prof. Vibha ptel,
Assistant Professor, Associate Professor
Dept. of Computer Science & Engg., Dept. of Computer Science & Engg.,
Institute of Technology, Institute of Technology,
Nirma University, Ahmedabad Nirma University, Ahmedabad
Dr.Sanjay Garg
Professor and Head of Department,
Dept. of Computer Science & Engg.,
Institute of Technology,
Nirma University, Ahmedabad
4
Abstract
Goal of a seminar is to understand and research about resource scheduling recently in used and briefly
describe about various application of resource scheduling.some of topics which covers in the seminar are
following:
ˆ what is resource scheduling
ˆ Need of resource scheduling
ˆ resource scheduling algorithm work on different algorithm which are support it.
ˆ explain support algorithm.
ˆ application of different algorithm
There is one point is resource scheduling algorithm which helpful for resource allocation, resource provisioning
needs reliable and efficient support of negotiation ,monitoring, metering, and feedback
5
Acknowledgements
I would like to express my heartfelt gratitude to Prof. Vibha patel,Associate Professor in Department of
computer science and engineering for his valuable time and guidance that made the seminar project work
a success. Thanking all my friends and all those who had helped me in carrying out this work. I am also
indebted to the library resources centre and interest services that enabled us to ponder over the vast subject
of ”resource scheduling”.
I am also gratefull to my Seminar faculty prof. Prof.preeti katheria who gave us enormous advice and help
me in my seminar to be fulfilled successfully.
- SHILPA DAMOR.
09BIT007
Contents
Abstract 4
List of Figures 7
1 Introduction 8
2 NEED OF RESOURCE SCHEDULING ALGORITHM 10
2.1 About RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.2 Technical aspects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Resource managment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3 Types of algorithm 11
3.1 genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.1 introduction of genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.2 step of genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1.3 Advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1.4 disadvantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.1.5 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2 bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.1 introduction of bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.2 step of bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.3 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3 ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1 introduction of ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.2 step of ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.3 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4 work flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4.1 introduction of work flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4.2 key concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4.3 step of worl flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4.4 advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4.5 disadvantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.5 load balance algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.5.1 introduction of load balance algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.5.2 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6
List of Figures
1.1 how data is proceeds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 structure of cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
7
Chapter 1
Introduction of cloud computing
Cloud computing is nothing but it is a collection/group of integrated and networked hardware, software and
Internet infrastructure (called a platform).
In addition, the platform provides on demand services, that are always on, anywhere, anytime and any place.
Cloud computing technology virtualizes and offers many services across the network. It mainly aims at scal-
ability, availability, throughput, and resource utilization
What is resource scheduling?
ˆ Resource scheduling is a way of determining schedule On which activities should be performed.
ˆ Demand for resource.
ˆ resources scheduling strategy is the key technology in cloud computing
How data is proceeds:
Figure 1.1: how data is proceeds
8
CHAPTER 1. INTRODUCTION 9
structure
Figure 1.2: structure of cloud
Chapter 2
NEED OF RESOURCE
SCHEDULING ALGORITHM
2.1 About RSA
ˆ Minimize the variation during the resource demand
ˆ Improve efficiency
ˆ Reflect reality
ˆ Modifying activities within time , in other word modify resource loading for each unit of time.
2.2 Technical aspects
ˆ Not every technology is absolutely new, but is enhanced to realize a specific feature, directly or as a
pre-condition.
ˆ Virtualization is an essential characteristic of cloud computing. Virtualization in clouds refers to
multi-layer hardware platforms, operating systems, storage devices, network resources, etc.
ˆ The first prominent feature of virtualization is the ability to hide the technical complexity from users, so
it can improve independence of cloud services. Secondly, physical resource can be efficiently configured
and utilized, considering that multiple applications are run on the same machine.
ˆ Thirdly, quick recovery and fault tolerance are permitted.
ˆ Virtual environment can be easily backed up and migrated with no interruption in service
2.3 Resource managment
ˆ From the providers point of view, large scale of virtual machines needs to be allocated to thousands of
distributed users, dynamically, fairly, and most important, profitably.
ˆ From the consumers point of view, users are economy-driven entities when they make the decision to
use cloud service
10
Chapter 3
Types of algorithm
ˆ genetic algorithm
ˆ bee algorithm
ˆ ant colony algorithm
ˆ work flow algorithm
ˆ load balance algorithm
3.1 genetic algorithm
3.1.1 introduction of genetic algorithm
ˆ This work describes a genetic algorithm approach to resource-constrained scheduling using a direct,
time-based representation
ˆ This document describes a genetic algorithm for finding optimal solutions to dynamic resource-constrained
scheduling problems.
ˆ the genetic algorithm was applied to over 1000 small job shop and project scheduling problems (10-300
activities, 3-10 resource types).the algorithm performed fairly well on a wide variety of problems.genetic
algorithms operate on a population of solutions rather than a single solution and employ heuristics
such as selection, crossover, andmutation to evolve better solutions.
3.1.2 step of genetic algorithm
ˆ it is necessary to encode any possible solution of the problem as population.
ˆ The next step is to generate an initial population from valid chromosomes(population).
ˆ During each successive generation, a proportion of the existing population is selected to breed a new
generation.
ˆ Genetic operators
The next step is to generate a second generation population of solutions from those selected through
genetic operators: crossover (also called recombination), and/or mutation. For each new solution to
be produced, a pair of ”parent” solutions is selected for breeding from the pool selected previously.
By producing a ”child” solution using the above methods of crossover and mutation, a new solution is
created which typically shares many of the characteristics of its ”parents”. New parents are selected
for each new child, and the process continues until a new population of solutions of appropriate size
is generated. Although reproduction methods that are based on the use of two parents are more
”biology inspired”, some research[3][4] suggests that more than two ”parents” generate higher quality
chromosomes.
11
CHAPTER 3. TYPES OF ALGORITHM 12
ˆ termination
This generational process is repeated until a termination condition has been reached. Common termi-
nating conditions are: A solution is found that satisfies minimum criteria
Fixed number of generations reached
Allocated budget (computation time/money) reached
The highest ranking solution’s fitness is reaching or has reached a plateau such that successive itera-
tions no longer produce better results
Manual inspection
Combinations of the above
3.1.3 Advantage
used to generate useful solutions to optimization and search problems.
3.1.4 disadvantage
The genetic algorithm performed well on someproblems that were very difficult for the branch and
bound techniques (i.e. the branch andbound method took a long time to find the optimal solution
the genetic algorithm did not perform well on problems inwhich the resources were tightly constrained.
This comes as little surprise since therepresentation forces the genetic algorithm to search for resource-
feasibility, and tightlyconstrained resources mean fewer resource-feasible solutions
the genetic algorithm did not perform well on the jobshop problem
3.1.5 application
ˆ bioinformatics
ˆ phylogenetics
ˆ computational science
ˆ engineering
ˆ economics
ˆ chemistry
ˆ manufacturing
ˆ mathematics
ˆ physics
CHAPTER 3. TYPES OF ALGORITHM 13
3.2 bee algorithm
3.2.1 introduction of bee algorithm
It is a nature inspired algorithm which tries to track the activities of bee to get their food.
First they select scout bee to go and search a wide domain of areas, if a scout bee finds a poten-
tial food resource it returns to its hive and does a waggle dance which tells other bees the direction and
the distance of the potential food resource. A set of selected bees goes to the food resource and starts
bringing in the honey while other scout bees does the same work and sets of bees are sent to different
location to bring in the food. After every identification of a food resource the scout bee informs others
and sets its course for other new sites nearby the potential food resource.
Using this activities we define terms as in no of scout bees (n), no of sites selected out of n visited sites
(m), no of best sites out of whole set (e), no of bees recruited for the best sites e (nep), no of bees
recruited for other sites (m-e)
3.2.2 step of bee algorithm
ˆ Initialize population with random solutions.
ˆ Evaluate fitness of the population.
ˆ While (stopping criterion not met)
ˆ Select sites for neighborhood search
ˆ Recruit bees for selected sites (more bees for best e sites) and evaluate fitness.
ˆ Select the fittest bee from each patch.
ˆ Assign remaining bees to search randomly and evaluate their fitness.
ˆ End While.
3.2.3 application
ˆ Training neural networks for pattern recognition.
ˆ Forming manufacturing cells.
ˆ Scheduling jobs for a production machine.
ˆ Solving continuous problems and engineering optimization.
ˆ Finding multiple feasible solutions to a preliminary design problems.
ˆ Data clustering
ˆ Optimising the design of mechanical components.
ˆ Multi-Objective Optimisation. a fuzzy logic controller for a robot gymnast. Vision and Image Analysis.
CHAPTER 3. TYPES OF ALGORITHM 14
3.3 ant colony algorithm
3.3.1 introduction of ant colony algorithm
same as bee algorithm. it is work done as bee algorithm
the first algorithm was aiming to search for an optimal path in a graph, based on the behavior of
ants seeking a path between their colony and a source of food.
3.3.2 step of ant colony algorithm
ˆ The first ant finds the food source (F), via any way (a), then returns to the nest (N), leaving behind
a trail pheromone (b)
ˆ Ants indiscriminately follow four possible ways, but the strengthening of the runway makes it more
attractive as the shortest route.
ˆ Ants take the shortest route; long portions of other ways lose their trail pheromones.
3.3.3 application
ˆ Ant Colony Optimization with Fuzzy Logic
This method introduces fuzzy intelligence into ants to accelerate searching ability
CHAPTER 3. TYPES OF ALGORITHM 15
3.4 work flow algorithm
3.4.1 introduction of work flow algorithm
Workflow scheduling is the problem of mapping each task to appropriate resource and allowing the
tasks to satisfy some performance criterion. Workflow is processes that consist of a series of steps
which simplifies the complexity of executions and management of applications.
3.4.2 key concept
The main concepts dealing in this paper are cloud computing and workflow scheduling. Cloud com-
puting is a term that involves delivering hosted services over the Internet. Workflow scheduling is the
problem of mapping each task to appropriate resource allowing the tasks to satisfy some performance
criterion
3.4.3 step of worl flow algorithm
A workflow enables the structuring of applications in a directed acyclic graph form where each node
represents the task and edges represent the dependencies between the nodes of the applications
A single workflow consists of a set of tasks and each task communicate with another task in the
workflow. Workflows are supported by Workflow Management Systems.
Workflow scheduling discovers resources and allocates tasks on suitable resources.
Workflow scheduling plays a vital role in the workflow management
Proper scheduling of workflow can have an efficient impact on the performance of the system.
For proper scheduling in workflows various scheduling algorithms are used.
3.4.4 advantage
With the emerging of cloud computing, cloud workflow systems are designed to facilitate the cloud in-
frastructure to support large scale distributed collaborative e-business and e-science applications. The
management and scheduling of resources in Cloud environment is complex, and therefore demands
sophisticated tools for analysis the algorithm before applying them to the real system.
3.4.5 disadvantage
Existing workflow algorithms does not consider the execution time. Therefore there is a need to
implement a new scheduling algorithm that can minimize the execution time in cloud environment.
Moving workflows to a cloud computing environment enables the use of various cloud services to
facilitate workflow execution.
CHAPTER 3. TYPES OF ALGORITHM 16
3.5 load balance algorithm
3.5.1 introduction of load balance algorithm
why we need load balancing in cloud?
to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid over-
load. Using multiple components with load balancing, instead of a single component, may increase
reliability through redundancy.
The load balancing service is usually provided by dedicated software or hardware, such as a multilayer
switch or a Domain Name System server.
3.5.2 application
One of the most used common applications of load balancing is to provide a single Internet service
from multiple servers, sometimes known as a server farm.
Commonly, load-balanced systems include popular web sites, large Internet Relay Chat networks,
high-bandwidth File Transfer Protocol sites, Network News Transfer Protocol (NNTP) servers and
Domain Name System (DNS) servers.
Lately, some load balancers have evolved to support databases; these are called database load bal-
ancers.alancers.
CHAPTER 3. TYPES OF ALGORITHM 17
3.6 References
ˆ http://atrak.usc.edu
ˆ http://www.cloudbus.org/cloudsim/doc/readme.txt
ˆ http://en.wikipedia.org
ˆ http://ieeexplore.ieee.org
Ad

Recommended

Cloud Management Mechanisms
Cloud Management Mechanisms
Souparnika Patil
 
Virtual machines and their architecture
Virtual machines and their architecture
Mrinmoy Dalal
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computing
Masoumeh_tajvidi
 
Basics of Cloud Computing
Basics of Cloud Computing
Pranav Vashistha
 
Cloud service models
Cloud service models
Prem Sanil
 
Data center Technologies
Data center Technologies
EMC
 
Parallel computing
Parallel computing
Vinay Gupta
 
Distributed system architecture
Distributed system architecture
Yisal Khan
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
Majid Hajibaba
 
virtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
Introdution and designing a learning system
Introdution and designing a learning system
swapnac12
 
Comparison of OS
Comparison of OS
Jaswanth R
 
Load balancing
Load balancing
ankur bhalla
 
Google App Engine
Google App Engine
Software Park Thailand
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Majid Hajibaba
 
cloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Compiler Design
Compiler Design
Mir Majid
 
Virtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
An Introduction to Open Source Software and Web Application Development
An Introduction to Open Source Software and Web Application Development
trevorthornton
 
Storage Virtualization
Storage Virtualization
rjain51
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Cloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Introduction to virtualization
Introduction to virtualization
Sasikumar Thirumoorthy
 
Warehouse scale computer
Warehouse scale computer
Hassan A-j
 
Task programming
Task programming
Yogendra Tamang
 
Unit 4
Unit 4
Ravi Kumar
 
operating system lecture notes
operating system lecture notes
AVC College of Engineering
 
cloud scheduling
cloud scheduling
Mudit Verma
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 

More Related Content

What's hot (20)

Distributed system architecture
Distributed system architecture
Yisal Khan
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
Majid Hajibaba
 
virtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
Introdution and designing a learning system
Introdution and designing a learning system
swapnac12
 
Comparison of OS
Comparison of OS
Jaswanth R
 
Load balancing
Load balancing
ankur bhalla
 
Google App Engine
Google App Engine
Software Park Thailand
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Majid Hajibaba
 
cloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Compiler Design
Compiler Design
Mir Majid
 
Virtualization- Cloud Computing
Virtualization- Cloud Computing
NIKHILKUMAR SHARDOOR
 
An Introduction to Open Source Software and Web Application Development
An Introduction to Open Source Software and Web Application Development
trevorthornton
 
Storage Virtualization
Storage Virtualization
rjain51
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Cloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Introduction to virtualization
Introduction to virtualization
Sasikumar Thirumoorthy
 
Warehouse scale computer
Warehouse scale computer
Hassan A-j
 
Task programming
Task programming
Yogendra Tamang
 
Unit 4
Unit 4
Ravi Kumar
 
operating system lecture notes
operating system lecture notes
AVC College of Engineering
 
Distributed system architecture
Distributed system architecture
Yisal Khan
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
Majid Hajibaba
 
virtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
Introdution and designing a learning system
Introdution and designing a learning system
swapnac12
 
Comparison of OS
Comparison of OS
Jaswanth R
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Majid Hajibaba
 
cloud computing:Types of virtualization
cloud computing:Types of virtualization
Dr.Neeraj Kumar Pandey
 
Compiler Design
Compiler Design
Mir Majid
 
An Introduction to Open Source Software and Web Application Development
An Introduction to Open Source Software and Web Application Development
trevorthornton
 
Storage Virtualization
Storage Virtualization
rjain51
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPT
Seminar Links
 
Cloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Warehouse scale computer
Warehouse scale computer
Hassan A-j
 

Viewers also liked (20)

cloud scheduling
cloud scheduling
Mudit Verma
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 
A Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud Computing
Mohd Hairey
 
Resource Scheduling
Resource Scheduling
Nicola2903
 
A tutorial on CloudSim
A tutorial on CloudSim
Habibur Rahman
 
REVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud Computing
Jaya Gautam
 
Application scheduling in cloud sim
Application scheduling in cloud sim
Pradeeban Kathiravelu, Ph.D.
 
Cloud sim report
Cloud sim report
Jiachen Yang
 
Resource allocation
Resource allocation
Kemuel Bryan Luciaja
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
SaikiranReddy Sama
 
Project Management
Project Management
Bilal Mustafa
 
A Review on Resource Allocation in Cloud Computing
A Review on Resource Allocation in Cloud Computing
IJARIIT
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
Kumar Goud
 
2015 cloud sim projects
2015 cloud sim projects
Hari Krishnan
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Editor IJCATR
 
Big data performance management thesis
Big data performance management thesis
Ahmad Muammar
 
Scheduling in CCE
Scheduling in CCE
Mayuri Saxena
 
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
A REVIEW ON RESOURCE ALLOCATION MECHANISM IN CLOUD ENVIORNMENT
INTERNATIONAL JOURNAL OF COMPUTERS AND TECHNOLOGY
 
Cloud sim
Cloud sim
Khyati Rajput
 
cloud scheduling
cloud scheduling
Mudit Verma
 
Task scheduling Survey in Cloud Computing
Task scheduling Survey in Cloud Computing
Ramandeep Kaur
 
A Survey on Resource Allocation & Monitoring in Cloud Computing
A Survey on Resource Allocation & Monitoring in Cloud Computing
Mohd Hairey
 
Resource Scheduling
Resource Scheduling
Nicola2903
 
A tutorial on CloudSim
A tutorial on CloudSim
Habibur Rahman
 
REVIEW PAPER on Scheduling in Cloud Computing
REVIEW PAPER on Scheduling in Cloud Computing
Jaya Gautam
 
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Enviro...
SaikiranReddy Sama
 
A Review on Resource Allocation in Cloud Computing
A Review on Resource Allocation in Cloud Computing
IJARIIT
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
Kumar Goud
 
2015 cloud sim projects
2015 cloud sim projects
Hari Krishnan
 
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment
Editor IJCATR
 
Big data performance management thesis
Big data performance management thesis
Ahmad Muammar
 
Ad

Similar to Resource scheduling algorithm (20)

KHAN_FAHAD_FL14
KHAN_FAHAD_FL14
Fahad Naeem
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] Report
Nandu B Rajan
 
Master's Thesis
Master's Thesis
Sridhar Mamella
 
Project final report
Project final report
ALIN BABU
 
Milan_thesis.pdf
Milan_thesis.pdf
kanaka vardhini
 
digiinfo website project report
digiinfo website project report
ABHIJEET KHIRE
 
Understanding and Preventing Cyberbullying_Report.pdf
Understanding and Preventing Cyberbullying_Report.pdf
yogeshgiriofficial
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
ambitlick
 
Knapp_Masterarbeit
Knapp_Masterarbeit
Nathaniel Knapp
 
Cenet-- capability enabled networking: towards least-privileged networking
Cenet-- capability enabled networking: towards least-privileged networking
Jithu Joseph
 
Plc report
Plc report
Priya Hada
 
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DiamondZ3
 
An Analysis of Component-based Software Development -Maximize the reuse of ex...
An Analysis of Component-based Software Development -Maximize the reuse of ex...
Mohammad Salah uddin
 
Plc report with project
Plc report with project
Priya Hada
 
thesis-2
thesis-2
danish shrestha
 
thesis-2005-029
thesis-2005-029
Judit Novak
 
bonino_thesis_final
bonino_thesis_final
Dario Bonino
 
document
document
Sanjaya Deshapriya
 
iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
Nandu B Rajan
 
Distributed Traffic management framework
Distributed Traffic management framework
Saurabh Nambiar
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] Report
Nandu B Rajan
 
Project final report
Project final report
ALIN BABU
 
digiinfo website project report
digiinfo website project report
ABHIJEET KHIRE
 
Understanding and Preventing Cyberbullying_Report.pdf
Understanding and Preventing Cyberbullying_Report.pdf
yogeshgiriofficial
 
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...
ambitlick
 
Cenet-- capability enabled networking: towards least-privileged networking
Cenet-- capability enabled networking: towards least-privileged networking
Jithu Joseph
 
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DiamondZ3
 
An Analysis of Component-based Software Development -Maximize the reuse of ex...
An Analysis of Component-based Software Development -Maximize the reuse of ex...
Mohammad Salah uddin
 
Plc report with project
Plc report with project
Priya Hada
 
bonino_thesis_final
bonino_thesis_final
Dario Bonino
 
iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
Nandu B Rajan
 
Distributed Traffic management framework
Distributed Traffic management framework
Saurabh Nambiar
 
Ad

Recently uploaded (20)

Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
ICT Frame Magazine Pvt. Ltd.
 
OpenPOWER Foundation & Open-Source Core Innovations
OpenPOWER Foundation & Open-Source Core Innovations
IBM
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Powering Multi-Page Web Applications Using Flow Apps and FME Data Streaming
Safe Software
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
 
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 

Resource scheduling algorithm

  • 1. RESOURCE SCHEDULING ALGORITHM BY SHILPA DAMOR 09bit007 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING AHMEDABAD-382481 April 2013
  • 2. RESOURCE SCHEDULING ALGORITHM Seminar Submitted in partial fulfillment of the requirements For the degree of Bachelor of Technology in Information Technology By SHILPA DAMOR 09BIT007 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING AHMEDABAD-382481 April 2013
  • 3. 3 Certificate This is to certify that the Seminar entitled ”RESOURCE SCHEDULING ALGORITHM(CLOUD COM- PUTING)” submitted by SHILPA DAMOR (09BIT007) , towards the partial fulfillment of the requirements for the degree of Bachelor of Technology in information technology of Nirma University of Science and Tech- nology, Ahmedabad is the record of work carried out by him under my supervision and guidance. In my opinion, the submitted work has reached a level required for being accepted for examination. The results embodied in this Seminar, to the best of my knowledge, haven’t been submitted to any other university or institution for award of any degree or diploma. Prof. preeti kathiria, Prof. Vibha ptel, Assistant Professor, Associate Professor Dept. of Computer Science & Engg., Dept. of Computer Science & Engg., Institute of Technology, Institute of Technology, Nirma University, Ahmedabad Nirma University, Ahmedabad Dr.Sanjay Garg Professor and Head of Department, Dept. of Computer Science & Engg., Institute of Technology, Nirma University, Ahmedabad
  • 4. 4 Abstract Goal of a seminar is to understand and research about resource scheduling recently in used and briefly describe about various application of resource scheduling.some of topics which covers in the seminar are following: ˆ what is resource scheduling ˆ Need of resource scheduling ˆ resource scheduling algorithm work on different algorithm which are support it. ˆ explain support algorithm. ˆ application of different algorithm There is one point is resource scheduling algorithm which helpful for resource allocation, resource provisioning needs reliable and efficient support of negotiation ,monitoring, metering, and feedback
  • 5. 5 Acknowledgements I would like to express my heartfelt gratitude to Prof. Vibha patel,Associate Professor in Department of computer science and engineering for his valuable time and guidance that made the seminar project work a success. Thanking all my friends and all those who had helped me in carrying out this work. I am also indebted to the library resources centre and interest services that enabled us to ponder over the vast subject of ”resource scheduling”. I am also gratefull to my Seminar faculty prof. Prof.preeti katheria who gave us enormous advice and help me in my seminar to be fulfilled successfully. - SHILPA DAMOR. 09BIT007
  • 6. Contents Abstract 4 List of Figures 7 1 Introduction 8 2 NEED OF RESOURCE SCHEDULING ALGORITHM 10 2.1 About RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 Technical aspects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3 Resource managment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3 Types of algorithm 11 3.1 genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.1 introduction of genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.2 step of genetic algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.3 Advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.1.4 disadvantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.1.5 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.2 bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.1 introduction of bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.2 step of bee algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.3 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.3 ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3.1 introduction of ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3.2 step of ant colony algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3.3 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.4 work flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4.1 introduction of work flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4.2 key concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4.3 step of worl flow algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4.4 advantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.4.5 disadvantage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.5 load balance algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.5.1 introduction of load balance algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.5.2 application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 6
  • 7. List of Figures 1.1 how data is proceeds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.2 structure of cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 7
  • 8. Chapter 1 Introduction of cloud computing Cloud computing is nothing but it is a collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform). In addition, the platform provides on demand services, that are always on, anywhere, anytime and any place. Cloud computing technology virtualizes and offers many services across the network. It mainly aims at scal- ability, availability, throughput, and resource utilization What is resource scheduling? ˆ Resource scheduling is a way of determining schedule On which activities should be performed. ˆ Demand for resource. ˆ resources scheduling strategy is the key technology in cloud computing How data is proceeds: Figure 1.1: how data is proceeds 8
  • 9. CHAPTER 1. INTRODUCTION 9 structure Figure 1.2: structure of cloud
  • 10. Chapter 2 NEED OF RESOURCE SCHEDULING ALGORITHM 2.1 About RSA ˆ Minimize the variation during the resource demand ˆ Improve efficiency ˆ Reflect reality ˆ Modifying activities within time , in other word modify resource loading for each unit of time. 2.2 Technical aspects ˆ Not every technology is absolutely new, but is enhanced to realize a specific feature, directly or as a pre-condition. ˆ Virtualization is an essential characteristic of cloud computing. Virtualization in clouds refers to multi-layer hardware platforms, operating systems, storage devices, network resources, etc. ˆ The first prominent feature of virtualization is the ability to hide the technical complexity from users, so it can improve independence of cloud services. Secondly, physical resource can be efficiently configured and utilized, considering that multiple applications are run on the same machine. ˆ Thirdly, quick recovery and fault tolerance are permitted. ˆ Virtual environment can be easily backed up and migrated with no interruption in service 2.3 Resource managment ˆ From the providers point of view, large scale of virtual machines needs to be allocated to thousands of distributed users, dynamically, fairly, and most important, profitably. ˆ From the consumers point of view, users are economy-driven entities when they make the decision to use cloud service 10
  • 11. Chapter 3 Types of algorithm ˆ genetic algorithm ˆ bee algorithm ˆ ant colony algorithm ˆ work flow algorithm ˆ load balance algorithm 3.1 genetic algorithm 3.1.1 introduction of genetic algorithm ˆ This work describes a genetic algorithm approach to resource-constrained scheduling using a direct, time-based representation ˆ This document describes a genetic algorithm for finding optimal solutions to dynamic resource-constrained scheduling problems. ˆ the genetic algorithm was applied to over 1000 small job shop and project scheduling problems (10-300 activities, 3-10 resource types).the algorithm performed fairly well on a wide variety of problems.genetic algorithms operate on a population of solutions rather than a single solution and employ heuristics such as selection, crossover, andmutation to evolve better solutions. 3.1.2 step of genetic algorithm ˆ it is necessary to encode any possible solution of the problem as population. ˆ The next step is to generate an initial population from valid chromosomes(population). ˆ During each successive generation, a proportion of the existing population is selected to breed a new generation. ˆ Genetic operators The next step is to generate a second generation population of solutions from those selected through genetic operators: crossover (also called recombination), and/or mutation. For each new solution to be produced, a pair of ”parent” solutions is selected for breeding from the pool selected previously. By producing a ”child” solution using the above methods of crossover and mutation, a new solution is created which typically shares many of the characteristics of its ”parents”. New parents are selected for each new child, and the process continues until a new population of solutions of appropriate size is generated. Although reproduction methods that are based on the use of two parents are more ”biology inspired”, some research[3][4] suggests that more than two ”parents” generate higher quality chromosomes. 11
  • 12. CHAPTER 3. TYPES OF ALGORITHM 12 ˆ termination This generational process is repeated until a termination condition has been reached. Common termi- nating conditions are: A solution is found that satisfies minimum criteria Fixed number of generations reached Allocated budget (computation time/money) reached The highest ranking solution’s fitness is reaching or has reached a plateau such that successive itera- tions no longer produce better results Manual inspection Combinations of the above 3.1.3 Advantage used to generate useful solutions to optimization and search problems. 3.1.4 disadvantage The genetic algorithm performed well on someproblems that were very difficult for the branch and bound techniques (i.e. the branch andbound method took a long time to find the optimal solution the genetic algorithm did not perform well on problems inwhich the resources were tightly constrained. This comes as little surprise since therepresentation forces the genetic algorithm to search for resource- feasibility, and tightlyconstrained resources mean fewer resource-feasible solutions the genetic algorithm did not perform well on the jobshop problem 3.1.5 application ˆ bioinformatics ˆ phylogenetics ˆ computational science ˆ engineering ˆ economics ˆ chemistry ˆ manufacturing ˆ mathematics ˆ physics
  • 13. CHAPTER 3. TYPES OF ALGORITHM 13 3.2 bee algorithm 3.2.1 introduction of bee algorithm It is a nature inspired algorithm which tries to track the activities of bee to get their food. First they select scout bee to go and search a wide domain of areas, if a scout bee finds a poten- tial food resource it returns to its hive and does a waggle dance which tells other bees the direction and the distance of the potential food resource. A set of selected bees goes to the food resource and starts bringing in the honey while other scout bees does the same work and sets of bees are sent to different location to bring in the food. After every identification of a food resource the scout bee informs others and sets its course for other new sites nearby the potential food resource. Using this activities we define terms as in no of scout bees (n), no of sites selected out of n visited sites (m), no of best sites out of whole set (e), no of bees recruited for the best sites e (nep), no of bees recruited for other sites (m-e) 3.2.2 step of bee algorithm ˆ Initialize population with random solutions. ˆ Evaluate fitness of the population. ˆ While (stopping criterion not met) ˆ Select sites for neighborhood search ˆ Recruit bees for selected sites (more bees for best e sites) and evaluate fitness. ˆ Select the fittest bee from each patch. ˆ Assign remaining bees to search randomly and evaluate their fitness. ˆ End While. 3.2.3 application ˆ Training neural networks for pattern recognition. ˆ Forming manufacturing cells. ˆ Scheduling jobs for a production machine. ˆ Solving continuous problems and engineering optimization. ˆ Finding multiple feasible solutions to a preliminary design problems. ˆ Data clustering ˆ Optimising the design of mechanical components. ˆ Multi-Objective Optimisation. a fuzzy logic controller for a robot gymnast. Vision and Image Analysis.
  • 14. CHAPTER 3. TYPES OF ALGORITHM 14 3.3 ant colony algorithm 3.3.1 introduction of ant colony algorithm same as bee algorithm. it is work done as bee algorithm the first algorithm was aiming to search for an optimal path in a graph, based on the behavior of ants seeking a path between their colony and a source of food. 3.3.2 step of ant colony algorithm ˆ The first ant finds the food source (F), via any way (a), then returns to the nest (N), leaving behind a trail pheromone (b) ˆ Ants indiscriminately follow four possible ways, but the strengthening of the runway makes it more attractive as the shortest route. ˆ Ants take the shortest route; long portions of other ways lose their trail pheromones. 3.3.3 application ˆ Ant Colony Optimization with Fuzzy Logic This method introduces fuzzy intelligence into ants to accelerate searching ability
  • 15. CHAPTER 3. TYPES OF ALGORITHM 15 3.4 work flow algorithm 3.4.1 introduction of work flow algorithm Workflow scheduling is the problem of mapping each task to appropriate resource and allowing the tasks to satisfy some performance criterion. Workflow is processes that consist of a series of steps which simplifies the complexity of executions and management of applications. 3.4.2 key concept The main concepts dealing in this paper are cloud computing and workflow scheduling. Cloud com- puting is a term that involves delivering hosted services over the Internet. Workflow scheduling is the problem of mapping each task to appropriate resource allowing the tasks to satisfy some performance criterion 3.4.3 step of worl flow algorithm A workflow enables the structuring of applications in a directed acyclic graph form where each node represents the task and edges represent the dependencies between the nodes of the applications A single workflow consists of a set of tasks and each task communicate with another task in the workflow. Workflows are supported by Workflow Management Systems. Workflow scheduling discovers resources and allocates tasks on suitable resources. Workflow scheduling plays a vital role in the workflow management Proper scheduling of workflow can have an efficient impact on the performance of the system. For proper scheduling in workflows various scheduling algorithms are used. 3.4.4 advantage With the emerging of cloud computing, cloud workflow systems are designed to facilitate the cloud in- frastructure to support large scale distributed collaborative e-business and e-science applications. The management and scheduling of resources in Cloud environment is complex, and therefore demands sophisticated tools for analysis the algorithm before applying them to the real system. 3.4.5 disadvantage Existing workflow algorithms does not consider the execution time. Therefore there is a need to implement a new scheduling algorithm that can minimize the execution time in cloud environment. Moving workflows to a cloud computing environment enables the use of various cloud services to facilitate workflow execution.
  • 16. CHAPTER 3. TYPES OF ALGORITHM 16 3.5 load balance algorithm 3.5.1 introduction of load balance algorithm why we need load balancing in cloud? to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid over- load. Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy. The load balancing service is usually provided by dedicated software or hardware, such as a multilayer switch or a Domain Name System server. 3.5.2 application One of the most used common applications of load balancing is to provide a single Internet service from multiple servers, sometimes known as a server farm. Commonly, load-balanced systems include popular web sites, large Internet Relay Chat networks, high-bandwidth File Transfer Protocol sites, Network News Transfer Protocol (NNTP) servers and Domain Name System (DNS) servers. Lately, some load balancers have evolved to support databases; these are called database load bal- ancers.alancers.
  • 17. CHAPTER 3. TYPES OF ALGORITHM 17 3.6 References ˆ http://atrak.usc.edu ˆ http://www.cloudbus.org/cloudsim/doc/readme.txt ˆ http://en.wikipedia.org ˆ http://ieeexplore.ieee.org