LOCK-FREE FIFO BASED PARALLEL HTB IN CLOUD COMPUTING
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
Cloud computing is becoming more and more popular in IT industry nowadays. Those famous companies including Amazon, IBM, HP, Google and Microsoft are creating and deploying Clouds in various locations around the world. Technically, Cloud Computing refers to both the applications delivered as services over the Internet. In the cloud, there might be tens of thousands or even more users accessing resource simultaneously, which give an extremely high pressure on the cloud. An effective traffic control mechanism which can both control the network traffic and make full use of network bandwidth is Hierarchical Token Buckets (HTB). It is used to control the outbound bandwidth on a given link. HTB ensures that the traffic rate for each class is at least the amount assigned to it. And the main difference between HTB and other queue discipline is when a class requests less than the amount assigned, the remaining bandwidth can be “borrowed” by other classes which request more. This solution is very suitable for service provider such as cloud computing: the basic requirements are guaranteed when there are many concurrent users (based on their payment), and when there are free resources, users can enjoy a better experience. Unfortunately, the existing HTB implementation can afford 0.5Gbps speed at most, making it impossible to be utilized in the cloud. With the popularity of multicore processors, a possible improvement is making the original sequential HTB into parallel, which might raise its processing speed.
Authors and Affiliations
T. PRANAV , M. PRAVIN KUMAR , DR. C. NALINI
Study Of Multidomain Query Optimization And Answering
In queries having multiple domains it is seen that general purpose search engines are not able to answer multidomain queries and one of the domain is considered by specific search services but no integrated framework is...
Implementation of a new 32-bit Algorithm for Password Hashing
The importance of hash algorithms for protecting the authenticity of information is exhibited. Application includes probity protection, traditional message authentication and digital signatures. As it is evident from rec...
Privacy preservation for Neural Network Training
Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the...
Genetic Programming and Artificial Neural Networks in a Chemical Process System
The main objective in this paper is to develop a mathematical model of the glucose to gluconic acid batch fermentation process utilizing novel techniques such as Genetic Programming and Artificial Neural Networks. Downlo...
Implementation of Multicloud Computing Deployment System of SAAS & IAAS for Effective Resource Utilization on MTC Application
Cloud computing is gaining acceptance in several IT organizations. In this paper, we have a tendency to explore this state of affairs to deploy a computing cluster on the highest of a multi cloud infrastructure, for reso...