The optimize load balancing in cluster computing.
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
In this paper we introduce the efficient load balancing algorithm which is helpful to distribute the packet of data to the group of slave processor for achieving the highest possible execution speed and proper utilization of system processor. We propose the load balancing algorithm in the cluster environment means group of slave processor make the cluster or communicator and master processor distribute work to the particular communicator . communicator have unique id which give identification to this. cluster computing provide various computing resource to facilitate execution of large scale task so select the proper node for execute a task able to enhance the performance of large scale cluster computing environment .The performance of the processor is calculated by the system throughput and response time . In our proposed algorithm one communicator do one type of work .It strike a good balancing throughput and output order of data unit and process Synchronization. this type of computing is very important in Engineering and scientific field where different different job come in the main processor.
Authors and Affiliations
Mr. Sunil Kumar Pandey , y, Prof. Rajesh Tiwari.
Improving the Performance of a Single Model and Test Prioritization Strategy for Event Driven Software
Event-driven software is very diverse, e.g., in form of Graphical User Interfaces (GUIs), Web applications, or embedded software. All EDS take sequences of events (e.g., messages and mouse-clicks) as input, change their...
Analysis of local and global techniques for disparity map generation in stereo vision
The field of computer vision is still open to generate 3D images (depth) using stereo image pairs. Obtaining reliable depth estimation has importance in robotic applications and autonomous systems. Stereo vision is...
A cryptographic Image Encryption technique based on the RGB PIXEL shuffling
Confidentiality is one of the ultimate goals in information security. Through encryption one can prevent a third party from understanding raw data during signal transmission. The encryption methods for enhancing th...
Design and implementation of low power 16 bit ALU with clock gating
The ALU is one of the most frequently accessed modules in a CPU and is utilized during most instruction executions. Hence the power consumption of the ALU is a major concern.In this paper a low power 16 bit ALU is...
A Comparative Survey on Availability and Integrity Verification in Multi-Cloud
In cloud environment, an enormous amount of data is produced everyday. Many organizations are now migrated to cloud and demand for resource is increasing. Hence the providers are now delivering multi-cloud environm...