SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3358
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
STRS: Standing and Trustworthy Resource Scheduler for Cloud
Computing Environment
Anumula Shiva Kumar Reddy
M.Tech in Software Engineering
Aurora’s Technological & Research Institute,
parvathapur, uppal, Hyderabad-500039
M.DEEPIKA
ASSOCIATE PROFESSOR in CSE DEPARTMENT
Aurora’s Technological & Research Institute,
parvathapur, uppal, Hyderabad-500039
Abstract: Mainly in the Computational Clusters, the most matter goes to communicating. To be able to reduce the communication
cost and formulate its functionality researchers have been conducting research on setting of data in distribution system. In the
early research, for the development of operation in transactions, the duplication of positioning issue on data is mentioned. In the
current paper, chiefly model allocation decisions could be produced locally for every model site in a tree network, with data access
knowledge of its neighbors is discussed and second for correlative resources in environment a new replication price model is
focused. With regards to the first research of price model and algorithms, the current model, an "Standing and Trustworthy
Resource Scheduler for Cloud Computing Environment" (STRS) for correlative data in web environment is created. The
algorithm gets near optimal solutions for the correlative data model and creates performance development. The experimental
studies clarify usage allocation algorithm and the intra bunch resource replication significantly outperforms the general frequency
based replication schemes.
I. Introduction
With all the improvements in network technologies,
applications are entirely moving toward serving widely distributed
users. However, now's Internet still cannot guarantee quality of
services and possible congestions may lead to lengthy delays and
make unsatisfied customers. The difficulty might be more acute
when the accesses require a substantial number of data. Web
caching is really a successful case of the approach. But once the
data can be updated, the difficulty is more complex. The more
models in the machine, the more complex the update cost will be.
Thus, data needs to be carefully put to prevent unnecessary
overhead.
Usually, the access routine is used to direct the placement choice.
Dynamic [2, 7 and several concerns like static [1], 15] positioning
choices and complete and partial replication schemes also have
been investigated. Almost all the product placement algorithms
don't especially presume complete or partial replication [5, 15]. In
fact, the majority of the placement choice algorithms could be
placed on both cases by managing the granularity of the assets
which are considered. But, every one of the algorithms presumes
that assets aren't dependent on one another. In several applications,
each and every request/trade might have access to numerous
sources and, so, bringing correlation among the sources. Going by
example, for a read trade accessing multiple resources, many of
these sources at a nearby website will have the ability to decline
communicating overhead.
But, in the event of just part of-the data set that's being accessed is
modeled at a local website, and then the replication won't bring
much advantage. The reason being the trade still demands to be
forwarded as a way to regain the assets that are left out. The same
is placed on an update transaction that's accessing multiple
resources. In the event of just part of the data set that's being
updated is modeled, a concept is needed for sending the upgrade
request. So, to get better model allocation, it is crucial to consider
the access correlation among resources. Further, it presumes that
each time the base station node holds the complete data set
(containing all assets which may be needed by the mobile nodes).
That is necessary for minimizing the cellular unit connection time
for the accesses. Several problems should be considered, whenever
the general Internet environment is considered. The first one is
because there isn't any need of contemplating the link time for Web
based clients and partial replication is needed.
So, the best algorithm is obtainable in this instance. Section 2
describes issue definition and our system model, conditioned upon
the machine model that's described in [12]. Section 3 delves about
the trade based price model in a distributed environment. Section 5
deals about usage partial replication algorithm and a intra bunch
resource replication (ORPNDA).
II. Resource allocation System Format
Studies reveal that the networks can be disintegrated into
connected autonomous systems, which are under separate
administrative control [9]. These autonomous systems are generally
treated as clusters. By this way the underlying topology of the
widely distributed system as a cluster based general graph is
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3359
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
modeled by us. For scaling the system, we presume that there is a
data server in each and every cluster. In this research, we take into
consideration only the data model placement on the computational
clusters, and the model assignment inside each cluster can be
treated separately. We presume that the actual copy of the entire set
of N resources that are to be accessed by users is put up at a
primary data server that is indicated as O. Let OD indicate the N
resources on the data server O, then, 1 2{ , ,..., }O ND d d d and
| OD | = N. Whenever applications use data saved in this primary
sever, they generally follow a shortest path tree routing to the data
source that is positioned at the primary server O [9]. Study reveals
that almost all routings are stable in days or weeks and so the
routing paths can be looked upon as a tree topology that is rooted at
the primary server O. So, we take into consideration replication the
widely distributed system as a tree graph, indicated as T, rooted at
the primary server O. To expedite efficient data accesses by users
in the Internet, a subset of resources in OD are modeled on
computational clusters in T.
Let xD indicate the resources on a data server x, then
xD ⊆ OD , and | xD | is the number of modeled resources in
xD . Take a set of resources Ω, let R(Ω) indicate the resident set of
Ω that is the set of computational clusters hold Ω or a superset of
Ω, i.e. R(Ω) = {x∈T | Ω ⊆ xD }.The divided system bolsters both
read and update requests and each request can have access to an
random number of resources in OD . For each and every data
server x in T, there are a number of clients that are connected to it.
The requests that are given by these clients can be seen as requests
from the data server x. Presuming that clients can give both read
and update requests. Let t indicate a transaction, it can be a read
transaction or an update transaction. Let D (t) indicate the set of
resources read or updated by t, D (t) ⊆ OD , and D (t) is designated
as a transaction-data set of t. For a transaction t accessing D (t)
given by a data server v, if D (t) ⊆ VD , then t is served locally.
Contra wise, t is send to the closest data server, which can serve t.
For an update transaction t, the data server that performs
t requires to send the update to other computational clusters
through the edges in a tree that only possess of all those
computational clusters *x in T, where D (t) ∩ *xD ≠ φ. Our aim is
to optimally allocate the models resources in OD to computational
clusters in T in such a way that aggregate access cost is minimized
for a given client access pattern. We define a model placement that
is having the minimal cost as an optimal model placement of OD
(OptPl ( OD )). Observe that optimal placement solutions may not
be unique. Take a data set Ω, R (Ω) in an OptPl ( OD ) is an
optimal resident set of Ω. During this research, we don’t take into
consideration node capacity constraint, message losses, node
failures, and the consistency maintenance issues. The
communication cost that is brought up by model placement and de-
allocation is also not taken into consideration.
III. STRS Algorithm
From [13], the model placement problem in T can be
resolved by designating models in each sub tree respectively, and
the placement of models on each data server in T can also be done
independently to its neighboring computational clusters in T.
Moreover, the set of resources on v, VD , is a subset of wD ,
where w is the parent data server of v in T. The model placement
on v can be treated only dependent on w and they are not dependent
on other computational clusters. By this way, the model placement
problem can be resolved by a distributed optimal partial replication
(STRS) algorithm (including STRSA and STRSD, in Fig. 1). At the
end of time period,τi, parent data server y creates model allocation
decision for its child data server x by utilizing STRSA, depending
on its knowledge of the models on its child data server x that is got
from the end of last time period i -1.At the time of getting the
models that are allocated by y, data server x creates model de-
allocation decision for itself by utilizing STRSD. In STRSD, data
server x can only de-allocate a set of resources Ω from x only if x is
a leaf data server of R(Ω), and it has hold the model of resources in
Ω since the end of time periodτi-1. Let
a
optS (y, x, i ) indicate
the data set calculated by STRSA by data server y for its child x at
the end of i . Let
d
optS (x, i ) indicate the data set calculated
by STRSD by data server x for itself at the end of i . See that in
for averting replication oscillation, STRS need that model de-
allocation decision must be made for x after x has obtained model
from its parent data server y in the same time period i . Moreover,
in STRSA and STRSD, we require calculating the lower bound
cost for each new transaction-data union TranListIndexS S . One
easy way to calculate the lower bound cost is read_a ( superS , x) –
update_a (( TranListIndexS S ), x),
where
. 1
sup
TranList Length
er i TranListIndex iS S S
  , and Si is the data set
accessed by TranList[i], TranListIndex ≤ i ≤ n.
IV. ORPNDA Algorithm
ORPNDA since the run time of OPR algorithms develops
exponentially with the number of transactions; we construct a intra
cluster resource replication and utilization replication algorithms
ORPNDA, in which the heuristic Expansion-Shrinking algorithms
(discussed in [12]) is utilized.
The heuristic Expansion-Shrinking algorithms now
utilize the cost functions that are defined in Section 3. Moreover, in
order to make ORPNDA stabilize, we combine the Set-Expansion
and Set-Shrinking algorithms. In both algorithms, the data server
first performs the Set-Expansion algorithm and calculates a data
set, which is a subset of the optimal data set that is calculated by
the optimal algorithms. Now, it performs the Set-Shrinking
algorithm presuming that the data set calculated by the Set-
Expansion algorithm is already designated to the child data server
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3360
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
or de-allocated from itself. Finally, we merge the data sets
calculated by the two algorithms as the final data set to be
designated from y to x or de-allocated from x. The model allotment
process of ORPNDA algorithm (ORPNDA-A) and the model
withhold for ORPNDA algorithm (ORPNDA-W) are indicated in
Fig. 2 and 3, respectively. ORPNDA is defined as given below. At
the end of time period, τi, parent data server y creates model
allocation decision for its child data server x by performing ESRA,
depending on its knowledge of the models on its child data server x
got from the end of last time period 1i  .
:cos _ ( ( , , ), ),a
opr iMinCost t a S y   initialized to + ;
_ :cos _ ( ( , , ), ),a
oprMinCost d t a S y i  initialized to
+ ;
S: the contained set during the search, initialized to ;
LowerBoundCost( newS ) & LowerBoundCost_d( newS ):
defined following the algorithm
TranList: the set of distinct transactions that access data;
TranListIndex: initialized to 0;
If (TranListIndex < TranList.Length) {
;TranListIndeS TranList 
[TranListIndex].getDataObjectSet();
newS =S  TranListIndeS  ;
if(LowerBoundCOst( newS ) < MinCost) {
DOPRA( newS , TranListIndex+1); }
DOPRA(S, TranListIndex+1); }
else if(cost_ a (S,x) < MinCost) {
MinCost=cost_ a (S,x);
( , , ) ;a
opt i MCS y S D   }
if(TranListIndex < TranList.Length) {
;TranListIndeS TranList 
[TranListIndex].getDataObjectSet();
newS = S  TranListIndeS  ;
if(LowerBoundCost_d( newS )  MinCost_d) {
DOPRD( newS ,TranListIndex+1); }
DOPRD(S, TranListIndex+1); }
else if(cost_d(S,x)  MinCost_d) {
MinCost_d=cost_d(S,x);
( , ) ;d
opt iS S  }
Fig 1: STRS Algorithm
,a
newS *
,a
newS **
. :a
newS S data sets and initialized to  ;
**
:yL a record log vector and initialized to  ;
Make a copy of
*
yL for cost computing;
while
*
yL  
for all data set recorded in
*
yL choose the
data set S such that |S -
a
newS | is minimal;
if(S  ** a
newS   ) delete the record with S from
*
yL
else if cost_ a (S,x) < 0 && S  a
newS =
then
a
newS =
a
newS S;
else if cost_ a (
a
newS S,x) < cost_ a (
a
newS ,x)
then
a
newS =
a
newS S;
else if (cost_ a (S,x) >=0 && S  a
newS = )|| (S  a
newS )
then
a
newS remains unchanged;
if the size of
a
newS has been increased,
then delete the record with S from * y
L and
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3361
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
move all records from
**
yL to
*
yL
else move the record with S from
*
yL to
**
yL
* a
newS =
a
newS ;
move all records from
**
yL to
*
yL
,and
a
newS =
 ;
Assume that
* a
newS has been allocated to
x(
*
D =
D 
* a
newS
and re-do log reduction in
*
;yL
while
*
yL  
for all data set recorded in
*
yL
choose the data set S with |S-
a
newS | is minimal;
if cost_ a ( yD -
*
yD - S -
a
newS , x)
a
newS =
a
newS S;
if the size of newS has been increased,
then delete the record with S from
*
yL
and move all records from
**
yL to
*
yL
else move the record with S from
*
yL
to
**
yL
** a
newS = yD -
*
D -
a
newS ;
if (cost(
** a
newS ,x) < 0)
** a
newS = ;
a
newS =
** a
newS  * a
newS ;
Fig 2: ORPNDA algorithm for Model allotment(ORPNDA-
A)
After getting the models from y, data server x performs
ESRD and makes model de-allocation decision for itself. At
this point, data server x can only de-allocate a set of
resources Ω from x only if x is a leaf data server of R(Ω),
and it has held the model of resources in Ω since the end of
time period 1i  . Observe that for averting replication
oscillation, ORPNDA needs that model de-allocation
decision must be made for x after x has obtained model from
its parent data server y during same time period i .
* **
. , ,
d d d
new new newS S S S: data sets and initialized to ;
**
L : a temporary record log vector and initialized to  ;
Make a copy of
*
L for cost computing;
while(
*
L   )
For all data set recorded in
*
L , choose
the data set S such that |S -
d
newS | is minimal;
if(S  ** d
newS  ) delete the record with S from
*
L
else if cost_d(S,x) < 0 && S  d
newS =
then
d
newS =
d
newS S;
else if cost_d(
d
newS S,x) < cost_ a (
d
newS ,x)
then
d
newS =
d
newS S;
else if (cost_d(S,x)>=0 && S  d
newS = )||(S  d
newS )
then
d
newS remains unchanged;
if the size of
d
newS has been increased
then delete the record with S from
*
L and
move all records from
**
L to
*
L
else move the record with S from
*
L to
**
L
* d
newS =
d
newS ;
move all records from
**
L to
*
L , and
d
newS = ;
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3362
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
Assume
* d
newS has been de-allocated from x
(
*
D = D -
* d
newS ) and re-do log reduction in
*
L ;
while
*
L  
for all data set recorded in
*
,BCL
choose the data set S with |S- newS | is minimal;
if cost_d(
*
D - S -
d
newS ,x) < cost_d(
*
D -
d
newS ,x)
d
newS =
d
newS S;
if the size of
d
newS has been increased, then
delete the record with S from
*
L
and move all the records from
**
L to
*
L .
else move the record with S from
*
L to
**
L .
** d
newS =
*
D -
d
newS ;
If(cost_d(
** d
newS ,x)  0)
** d
newS = ;
d
newS =
** d
newS  * d
newS ;
Fig 3: ORPNDA algorithm for model withhold (ORPNDA-
W)
V. Simulation Results
In this simulation, we utilize one PC platform for
simulating 20 server clusters and the period of execution for each
and every experiment spans 10 time periods. The simulated
distributed algorithm requires retaining the history logs for every
request (most of the information is not required in a real system).
Because of the excessive I/O, the simulation process becomes very
time-consuming (observe that the time is not because of the
algorithm itself). Helping to avert prejudiced access patterns,
multiple access patterns are produced haphazardly and the data
collection process is redone for each and every pattern. In order to
balance between the confidence level of the experimental results
and the time for the simulation study, we select repeating the
procedure 100 times (i.e., producing 100 distinct access patterns).
Whenever the number of resources and the number of transactions
increase, the system is likely to overload and we have to further
decline the repetition to 10 times (i.e., utilizing only 10 distinct
access patterns). The final data given in the following subsections
are the average of these trials.
Fig 4: The performance of the cost stabilization by STRS and
ORPNDA
Scalability in terms of Resources and Transactions
proportionality
Comparison of the “Optimal Resource Placing Node
Discovery Algorithm” ORPNDA with the distributed frequency-
based algorithm DFPR is done and calculate the effect of NS (the
number of resources in OD ) on their performance. The parameters
in this experiment are set as given here: DZ = 0.2, SZ = 0.5,
R/W = 0.9, ST = 3, NT = 50 * SN . M and NS changes from 10
to 100 (M is adjusted in order to make sure that we have access to
almost all resources). Fig. 5 indicates the number of messages
necessary for processing all the transactions given by the system
for the two algorithms. If SN increases, the number of messages
necessary for the two algorithms increases as the number of
transaction also increases. But, the difference of the message
necessary for the 2 algorithms will be remained in a stable way (the
number of message necessary for resource discovery and
replication with ORPNDA&STRS is 17% of that needed for only
resource discovery[16]), even though the variation in the number of
messages increases.
Fig 5: Scalability of resource discovery and usage[16] and
ORPNDA&STRS
International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014
3363
ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR
VI. Conclusion
In this paper, we scrutinize the dynamic designation of
correlated resources in computational clusters. We model the
topology of the network that is formed by the computational
clusters in the distributed system as a tree. Initially we show that
model designation decisions can be done locally for each and every
model site in a tree network, using data access knowledge of its
neighbors. Now, we develop a new replication cost model for
correlated resources in Internet environment. Depending on the cost
model and the algorithms that are used in previous research, we
have put in effort to develop a “Standing and Trustworthy Resource
Scheduler for Cloud Computing Environment” (STRS) for
correlated data in internet environment. STRS has 2 sub algorithms,
STRSA and STRSD, and it is indicated that STRS stabilizes and
converges in 2L time periods. Here, L is the height of the tree.
Now, an “Optimal Resource Placing Node Discovery
Algorithm” (ORPNDA) is now developed for making model
placement decisions in an efficient manner. The ORPNDA has 2
sub algorithms, namely, ORPNDA for model allotment and
ORPNDA for model withhold, and it is indicated that ORPNDA
stabilize in 2L time periods. The algorithm gets near optimal
solutions for the correlated data model and produces significant
performance gains. The simulation results indicate that the intra
cluster resource replication and utilization allocation algorithm
outperforms the general resource discovery and utilization schemes
in a significant way.
Reference
[1] P. Apers. Data allocation in distributed database systems. ACM
Transactions on Database Systems Vol. 13, No. 3 (Sept.).1988.
[2] A. Bestavros and C. Cunha. Server-initiated document
dissemination for the WWW. IEEE Data Engeneering Bulletin 19,
3 (Sept.), 3–11. 1996.
[3] S. Ceri, S. B. Navathe, and G. Wiederhold. Distribution design
of logical database schemas. IEEE Transactions on Software
Engineering, Vol. SE-9, No. 4. 1983.
[4] D. Dowdy and D. Foster. Comparative models of the file
assignment problem. Computing Surveys, 14(2), 1982.
[5] Y. Huang, P. Sistla, and O. Wolfson. Data replication for
mobile computers. In Proceeding of 1994 ACM SIGMOD, May
1994.
[6] K. Kalpakis, K. Dasgupta, and O. Wolfson. Optimal placement
of models in trees with read, write, and storage costs. IEEE
Transactions on Parallel and Computational Clusters. Vol 12, No.
6. 2001.
[7] D. Kossmann. The state of the art in distributed query
processing. ACM Computing Surveys (CSUR). Volume 32, Issue
4. December 2000.
[8]Z. Lu and K. S. McKinley. Partial collection replication versus
cache for information retrieval systems. In Proceedings of the
ACM International Conference on Research and Development in
Information Retrieval, Athens, Greece, July 2000.
[9] V. Paxson, End-to-End Routing Behavior in the Internet,
IEEE/ACM Transactions Networking, 5(5) (1997) 601-615.
[10] J. Sidell, P. Aoki, A. Sah, C. Staelin, M. Stonebrakeer, and A.
Yu. Data replication in Mariposa. In Proceedings IEEE Conference
on Data Engineering (New Orleans, LA, Feb.), 485–494. 1996.
[11] A. Sousa, F Pedone, R Oliveira, and F Moura. Partial
replication in the database state machine. In Proceedings of the
IEEE International Symposium on Network computing and
Applications. 2001.
[12] M. Tu, P. Li, L. Xiao I. Yen, and F. Bastani. Model placement
algorithms for mobile transaction systems. IEEE Transactions on
Knowledge and Data Engineering. Vol. 18, No. 7. 2006.
[13] M. Tu. A data management framework for secure and
dependable data grid. Ph.DDissertation, UT Dallas.
http://www.utdallas.edu/~tumh2000/ref/Thesis-Tu.pdf. July 2006.
[14] O. Wolfson and A. Milo. The multicast policy and its
relationship to modelted data placement. ACM Trans. Database
Systems. Vol.16, No.1. 1991
[15] O. Wolfson, S. Jajodia and Y. Huang. An adaptive data
replication algorithm. ACM Transactions on database systems.
Vol22. No.2 pages 255-314. 1997.
[16] Lanier Watkins, William H. Robinson, Raheem A. Beyah: A
Passive Solution to the Memory Resource Discovery Problem in
Computational Clusters. IEEE Transactions on Network and
Service Management 7(4): 218-230 (2010)

More Related Content

What's hot

A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...aciijournal
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregatorsIAEME Publication
 
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...IRJET Journal
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for properIJDKP
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs ShahDhruv21
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Zakaria Zubi
 
Improved text clustering with
Improved text clustering withImproved text clustering with
Improved text clustering withIJDKP
 
Distributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data StreamsDistributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data StreamsArinto Murdopo
 
10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data miningGeorge Ang
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks IJECEIAES
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving dataiaemedu
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithmijcsit
 
A study on rough set theory based
A study on rough set theory basedA study on rough set theory based
A study on rough set theory basedijaia
 
An efficient algorithm for privacy
An efficient algorithm for privacyAn efficient algorithm for privacy
An efficient algorithm for privacyIJDKP
 
Column store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setColumn store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setijma
 
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceIJDKP
 
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERINGA FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERINGIJDKP
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...IJECEIAES
 
Author paper midterm
Author paper midtermAuthor paper midterm
Author paper midtermPooja Mishra
 

What's hot (19)

A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real...
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregators
 
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...
IRJET- Sampling Selection Strategy for Large Scale Deduplication of Synthetic...
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
 
Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs Data Compression in Data mining and Business Intelligencs
Data Compression in Data mining and Business Intelligencs
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
Improved text clustering with
Improved text clustering withImproved text clustering with
Improved text clustering with
 
Distributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data StreamsDistributed Decision Tree Learning for Mining Big Data Streams
Distributed Decision Tree Learning for Mining Big Data Streams
 
10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data mining
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks
 
A frame work for clustering time evolving data
A frame work for clustering time evolving dataA frame work for clustering time evolving data
A frame work for clustering time evolving data
 
Output Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic AlgorithmOutput Privacy Protection With Pattern-Based Heuristic Algorithm
Output Privacy Protection With Pattern-Based Heuristic Algorithm
 
A study on rough set theory based
A study on rough set theory basedA study on rough set theory based
A study on rough set theory based
 
An efficient algorithm for privacy
An efficient algorithm for privacyAn efficient algorithm for privacy
An efficient algorithm for privacy
 
Column store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setColumn store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute set
 
Recommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduceRecommendation system using bloom filter in mapreduce
Recommendation system using bloom filter in mapreduce
 
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERINGA FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
 
Author paper midterm
Author paper midtermAuthor paper midterm
Author paper midterm
 

Similar to IJSETR-VOL-3-ISSUE-12-3358-3363

MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkIOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey IJECEIAES
 
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTER
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTERPERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTER
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTERijdms
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeSumant Tambe
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSijcses
 
Implementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataImplementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataeSAT Publishing House
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
 

Similar to IJSETR-VOL-3-ISSUE-12-3358-3363 (20)

Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
50120130406035
5012013040603550120130406035
50120130406035
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor Network
 
ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey
Workflow Scheduling Techniques and Algorithms in IaaS Cloud: A Survey
 
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTER
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTERPERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTER
PERFORMANCE EVALUATION OF SQL AND NOSQL DATABASE MANAGEMENT SYSTEMS IN A CLUSTER
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/SubscribeReactive Stream Processing for Data-centric Publish/Subscribe
Reactive Stream Processing for Data-centric Publish/Subscribe
 
50120130405014 2-3
50120130405014 2-350120130405014 2-3
50120130405014 2-3
 
J41046368
J41046368J41046368
J41046368
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
 
Implementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataImplementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big data
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 
F0423038041
F0423038041F0423038041
F0423038041
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid Systems
 

IJSETR-VOL-3-ISSUE-12-3358-3363

  • 1. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3358 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR STRS: Standing and Trustworthy Resource Scheduler for Cloud Computing Environment Anumula Shiva Kumar Reddy M.Tech in Software Engineering Aurora’s Technological & Research Institute, parvathapur, uppal, Hyderabad-500039 M.DEEPIKA ASSOCIATE PROFESSOR in CSE DEPARTMENT Aurora’s Technological & Research Institute, parvathapur, uppal, Hyderabad-500039 Abstract: Mainly in the Computational Clusters, the most matter goes to communicating. To be able to reduce the communication cost and formulate its functionality researchers have been conducting research on setting of data in distribution system. In the early research, for the development of operation in transactions, the duplication of positioning issue on data is mentioned. In the current paper, chiefly model allocation decisions could be produced locally for every model site in a tree network, with data access knowledge of its neighbors is discussed and second for correlative resources in environment a new replication price model is focused. With regards to the first research of price model and algorithms, the current model, an "Standing and Trustworthy Resource Scheduler for Cloud Computing Environment" (STRS) for correlative data in web environment is created. The algorithm gets near optimal solutions for the correlative data model and creates performance development. The experimental studies clarify usage allocation algorithm and the intra bunch resource replication significantly outperforms the general frequency based replication schemes. I. Introduction With all the improvements in network technologies, applications are entirely moving toward serving widely distributed users. However, now's Internet still cannot guarantee quality of services and possible congestions may lead to lengthy delays and make unsatisfied customers. The difficulty might be more acute when the accesses require a substantial number of data. Web caching is really a successful case of the approach. But once the data can be updated, the difficulty is more complex. The more models in the machine, the more complex the update cost will be. Thus, data needs to be carefully put to prevent unnecessary overhead. Usually, the access routine is used to direct the placement choice. Dynamic [2, 7 and several concerns like static [1], 15] positioning choices and complete and partial replication schemes also have been investigated. Almost all the product placement algorithms don't especially presume complete or partial replication [5, 15]. In fact, the majority of the placement choice algorithms could be placed on both cases by managing the granularity of the assets which are considered. But, every one of the algorithms presumes that assets aren't dependent on one another. In several applications, each and every request/trade might have access to numerous sources and, so, bringing correlation among the sources. Going by example, for a read trade accessing multiple resources, many of these sources at a nearby website will have the ability to decline communicating overhead. But, in the event of just part of-the data set that's being accessed is modeled at a local website, and then the replication won't bring much advantage. The reason being the trade still demands to be forwarded as a way to regain the assets that are left out. The same is placed on an update transaction that's accessing multiple resources. In the event of just part of the data set that's being updated is modeled, a concept is needed for sending the upgrade request. So, to get better model allocation, it is crucial to consider the access correlation among resources. Further, it presumes that each time the base station node holds the complete data set (containing all assets which may be needed by the mobile nodes). That is necessary for minimizing the cellular unit connection time for the accesses. Several problems should be considered, whenever the general Internet environment is considered. The first one is because there isn't any need of contemplating the link time for Web based clients and partial replication is needed. So, the best algorithm is obtainable in this instance. Section 2 describes issue definition and our system model, conditioned upon the machine model that's described in [12]. Section 3 delves about the trade based price model in a distributed environment. Section 5 deals about usage partial replication algorithm and a intra bunch resource replication (ORPNDA). II. Resource allocation System Format Studies reveal that the networks can be disintegrated into connected autonomous systems, which are under separate administrative control [9]. These autonomous systems are generally treated as clusters. By this way the underlying topology of the widely distributed system as a cluster based general graph is
  • 2. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3359 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR modeled by us. For scaling the system, we presume that there is a data server in each and every cluster. In this research, we take into consideration only the data model placement on the computational clusters, and the model assignment inside each cluster can be treated separately. We presume that the actual copy of the entire set of N resources that are to be accessed by users is put up at a primary data server that is indicated as O. Let OD indicate the N resources on the data server O, then, 1 2{ , ,..., }O ND d d d and | OD | = N. Whenever applications use data saved in this primary sever, they generally follow a shortest path tree routing to the data source that is positioned at the primary server O [9]. Study reveals that almost all routings are stable in days or weeks and so the routing paths can be looked upon as a tree topology that is rooted at the primary server O. So, we take into consideration replication the widely distributed system as a tree graph, indicated as T, rooted at the primary server O. To expedite efficient data accesses by users in the Internet, a subset of resources in OD are modeled on computational clusters in T. Let xD indicate the resources on a data server x, then xD ⊆ OD , and | xD | is the number of modeled resources in xD . Take a set of resources Ω, let R(Ω) indicate the resident set of Ω that is the set of computational clusters hold Ω or a superset of Ω, i.e. R(Ω) = {x∈T | Ω ⊆ xD }.The divided system bolsters both read and update requests and each request can have access to an random number of resources in OD . For each and every data server x in T, there are a number of clients that are connected to it. The requests that are given by these clients can be seen as requests from the data server x. Presuming that clients can give both read and update requests. Let t indicate a transaction, it can be a read transaction or an update transaction. Let D (t) indicate the set of resources read or updated by t, D (t) ⊆ OD , and D (t) is designated as a transaction-data set of t. For a transaction t accessing D (t) given by a data server v, if D (t) ⊆ VD , then t is served locally. Contra wise, t is send to the closest data server, which can serve t. For an update transaction t, the data server that performs t requires to send the update to other computational clusters through the edges in a tree that only possess of all those computational clusters *x in T, where D (t) ∩ *xD ≠ φ. Our aim is to optimally allocate the models resources in OD to computational clusters in T in such a way that aggregate access cost is minimized for a given client access pattern. We define a model placement that is having the minimal cost as an optimal model placement of OD (OptPl ( OD )). Observe that optimal placement solutions may not be unique. Take a data set Ω, R (Ω) in an OptPl ( OD ) is an optimal resident set of Ω. During this research, we don’t take into consideration node capacity constraint, message losses, node failures, and the consistency maintenance issues. The communication cost that is brought up by model placement and de- allocation is also not taken into consideration. III. STRS Algorithm From [13], the model placement problem in T can be resolved by designating models in each sub tree respectively, and the placement of models on each data server in T can also be done independently to its neighboring computational clusters in T. Moreover, the set of resources on v, VD , is a subset of wD , where w is the parent data server of v in T. The model placement on v can be treated only dependent on w and they are not dependent on other computational clusters. By this way, the model placement problem can be resolved by a distributed optimal partial replication (STRS) algorithm (including STRSA and STRSD, in Fig. 1). At the end of time period,τi, parent data server y creates model allocation decision for its child data server x by utilizing STRSA, depending on its knowledge of the models on its child data server x that is got from the end of last time period i -1.At the time of getting the models that are allocated by y, data server x creates model de- allocation decision for itself by utilizing STRSD. In STRSD, data server x can only de-allocate a set of resources Ω from x only if x is a leaf data server of R(Ω), and it has hold the model of resources in Ω since the end of time periodτi-1. Let a optS (y, x, i ) indicate the data set calculated by STRSA by data server y for its child x at the end of i . Let d optS (x, i ) indicate the data set calculated by STRSD by data server x for itself at the end of i . See that in for averting replication oscillation, STRS need that model de- allocation decision must be made for x after x has obtained model from its parent data server y in the same time period i . Moreover, in STRSA and STRSD, we require calculating the lower bound cost for each new transaction-data union TranListIndexS S . One easy way to calculate the lower bound cost is read_a ( superS , x) – update_a (( TranListIndexS S ), x), where . 1 sup TranList Length er i TranListIndex iS S S   , and Si is the data set accessed by TranList[i], TranListIndex ≤ i ≤ n. IV. ORPNDA Algorithm ORPNDA since the run time of OPR algorithms develops exponentially with the number of transactions; we construct a intra cluster resource replication and utilization replication algorithms ORPNDA, in which the heuristic Expansion-Shrinking algorithms (discussed in [12]) is utilized. The heuristic Expansion-Shrinking algorithms now utilize the cost functions that are defined in Section 3. Moreover, in order to make ORPNDA stabilize, we combine the Set-Expansion and Set-Shrinking algorithms. In both algorithms, the data server first performs the Set-Expansion algorithm and calculates a data set, which is a subset of the optimal data set that is calculated by the optimal algorithms. Now, it performs the Set-Shrinking algorithm presuming that the data set calculated by the Set- Expansion algorithm is already designated to the child data server
  • 3. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3360 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR or de-allocated from itself. Finally, we merge the data sets calculated by the two algorithms as the final data set to be designated from y to x or de-allocated from x. The model allotment process of ORPNDA algorithm (ORPNDA-A) and the model withhold for ORPNDA algorithm (ORPNDA-W) are indicated in Fig. 2 and 3, respectively. ORPNDA is defined as given below. At the end of time period, τi, parent data server y creates model allocation decision for its child data server x by performing ESRA, depending on its knowledge of the models on its child data server x got from the end of last time period 1i  . :cos _ ( ( , , ), ),a opr iMinCost t a S y   initialized to + ; _ :cos _ ( ( , , ), ),a oprMinCost d t a S y i  initialized to + ; S: the contained set during the search, initialized to ; LowerBoundCost( newS ) & LowerBoundCost_d( newS ): defined following the algorithm TranList: the set of distinct transactions that access data; TranListIndex: initialized to 0; If (TranListIndex < TranList.Length) { ;TranListIndeS TranList  [TranListIndex].getDataObjectSet(); newS =S  TranListIndeS  ; if(LowerBoundCOst( newS ) < MinCost) { DOPRA( newS , TranListIndex+1); } DOPRA(S, TranListIndex+1); } else if(cost_ a (S,x) < MinCost) { MinCost=cost_ a (S,x); ( , , ) ;a opt i MCS y S D   } if(TranListIndex < TranList.Length) { ;TranListIndeS TranList  [TranListIndex].getDataObjectSet(); newS = S  TranListIndeS  ; if(LowerBoundCost_d( newS )  MinCost_d) { DOPRD( newS ,TranListIndex+1); } DOPRD(S, TranListIndex+1); } else if(cost_d(S,x)  MinCost_d) { MinCost_d=cost_d(S,x); ( , ) ;d opt iS S  } Fig 1: STRS Algorithm ,a newS * ,a newS ** . :a newS S data sets and initialized to  ; ** :yL a record log vector and initialized to  ; Make a copy of * yL for cost computing; while * yL   for all data set recorded in * yL choose the data set S such that |S - a newS | is minimal; if(S  ** a newS   ) delete the record with S from * yL else if cost_ a (S,x) < 0 && S  a newS = then a newS = a newS S; else if cost_ a ( a newS S,x) < cost_ a ( a newS ,x) then a newS = a newS S; else if (cost_ a (S,x) >=0 && S  a newS = )|| (S  a newS ) then a newS remains unchanged; if the size of a newS has been increased, then delete the record with S from * y L and
  • 4. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3361 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR move all records from ** yL to * yL else move the record with S from * yL to ** yL * a newS = a newS ; move all records from ** yL to * yL ,and a newS =  ; Assume that * a newS has been allocated to x( * D = D  * a newS and re-do log reduction in * ;yL while * yL   for all data set recorded in * yL choose the data set S with |S- a newS | is minimal; if cost_ a ( yD - * yD - S - a newS , x) a newS = a newS S; if the size of newS has been increased, then delete the record with S from * yL and move all records from ** yL to * yL else move the record with S from * yL to ** yL ** a newS = yD - * D - a newS ; if (cost( ** a newS ,x) < 0) ** a newS = ; a newS = ** a newS  * a newS ; Fig 2: ORPNDA algorithm for Model allotment(ORPNDA- A) After getting the models from y, data server x performs ESRD and makes model de-allocation decision for itself. At this point, data server x can only de-allocate a set of resources Ω from x only if x is a leaf data server of R(Ω), and it has held the model of resources in Ω since the end of time period 1i  . Observe that for averting replication oscillation, ORPNDA needs that model de-allocation decision must be made for x after x has obtained model from its parent data server y during same time period i . * ** . , , d d d new new newS S S S: data sets and initialized to ; ** L : a temporary record log vector and initialized to  ; Make a copy of * L for cost computing; while( * L   ) For all data set recorded in * L , choose the data set S such that |S - d newS | is minimal; if(S  ** d newS  ) delete the record with S from * L else if cost_d(S,x) < 0 && S  d newS = then d newS = d newS S; else if cost_d( d newS S,x) < cost_ a ( d newS ,x) then d newS = d newS S; else if (cost_d(S,x)>=0 && S  d newS = )||(S  d newS ) then d newS remains unchanged; if the size of d newS has been increased then delete the record with S from * L and move all records from ** L to * L else move the record with S from * L to ** L * d newS = d newS ; move all records from ** L to * L , and d newS = ;
  • 5. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3362 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR Assume * d newS has been de-allocated from x ( * D = D - * d newS ) and re-do log reduction in * L ; while * L   for all data set recorded in * ,BCL choose the data set S with |S- newS | is minimal; if cost_d( * D - S - d newS ,x) < cost_d( * D - d newS ,x) d newS = d newS S; if the size of d newS has been increased, then delete the record with S from * L and move all the records from ** L to * L . else move the record with S from * L to ** L . ** d newS = * D - d newS ; If(cost_d( ** d newS ,x)  0) ** d newS = ; d newS = ** d newS  * d newS ; Fig 3: ORPNDA algorithm for model withhold (ORPNDA- W) V. Simulation Results In this simulation, we utilize one PC platform for simulating 20 server clusters and the period of execution for each and every experiment spans 10 time periods. The simulated distributed algorithm requires retaining the history logs for every request (most of the information is not required in a real system). Because of the excessive I/O, the simulation process becomes very time-consuming (observe that the time is not because of the algorithm itself). Helping to avert prejudiced access patterns, multiple access patterns are produced haphazardly and the data collection process is redone for each and every pattern. In order to balance between the confidence level of the experimental results and the time for the simulation study, we select repeating the procedure 100 times (i.e., producing 100 distinct access patterns). Whenever the number of resources and the number of transactions increase, the system is likely to overload and we have to further decline the repetition to 10 times (i.e., utilizing only 10 distinct access patterns). The final data given in the following subsections are the average of these trials. Fig 4: The performance of the cost stabilization by STRS and ORPNDA Scalability in terms of Resources and Transactions proportionality Comparison of the “Optimal Resource Placing Node Discovery Algorithm” ORPNDA with the distributed frequency- based algorithm DFPR is done and calculate the effect of NS (the number of resources in OD ) on their performance. The parameters in this experiment are set as given here: DZ = 0.2, SZ = 0.5, R/W = 0.9, ST = 3, NT = 50 * SN . M and NS changes from 10 to 100 (M is adjusted in order to make sure that we have access to almost all resources). Fig. 5 indicates the number of messages necessary for processing all the transactions given by the system for the two algorithms. If SN increases, the number of messages necessary for the two algorithms increases as the number of transaction also increases. But, the difference of the message necessary for the 2 algorithms will be remained in a stable way (the number of message necessary for resource discovery and replication with ORPNDA&STRS is 17% of that needed for only resource discovery[16]), even though the variation in the number of messages increases. Fig 5: Scalability of resource discovery and usage[16] and ORPNDA&STRS
  • 6. International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 12, December 2014 3363 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR VI. Conclusion In this paper, we scrutinize the dynamic designation of correlated resources in computational clusters. We model the topology of the network that is formed by the computational clusters in the distributed system as a tree. Initially we show that model designation decisions can be done locally for each and every model site in a tree network, using data access knowledge of its neighbors. Now, we develop a new replication cost model for correlated resources in Internet environment. Depending on the cost model and the algorithms that are used in previous research, we have put in effort to develop a “Standing and Trustworthy Resource Scheduler for Cloud Computing Environment” (STRS) for correlated data in internet environment. STRS has 2 sub algorithms, STRSA and STRSD, and it is indicated that STRS stabilizes and converges in 2L time periods. Here, L is the height of the tree. Now, an “Optimal Resource Placing Node Discovery Algorithm” (ORPNDA) is now developed for making model placement decisions in an efficient manner. The ORPNDA has 2 sub algorithms, namely, ORPNDA for model allotment and ORPNDA for model withhold, and it is indicated that ORPNDA stabilize in 2L time periods. The algorithm gets near optimal solutions for the correlated data model and produces significant performance gains. The simulation results indicate that the intra cluster resource replication and utilization allocation algorithm outperforms the general resource discovery and utilization schemes in a significant way. Reference [1] P. Apers. Data allocation in distributed database systems. ACM Transactions on Database Systems Vol. 13, No. 3 (Sept.).1988. [2] A. Bestavros and C. Cunha. Server-initiated document dissemination for the WWW. IEEE Data Engeneering Bulletin 19, 3 (Sept.), 3–11. 1996. [3] S. Ceri, S. B. Navathe, and G. Wiederhold. Distribution design of logical database schemas. IEEE Transactions on Software Engineering, Vol. SE-9, No. 4. 1983. [4] D. Dowdy and D. Foster. Comparative models of the file assignment problem. Computing Surveys, 14(2), 1982. [5] Y. Huang, P. Sistla, and O. Wolfson. Data replication for mobile computers. In Proceeding of 1994 ACM SIGMOD, May 1994. [6] K. Kalpakis, K. Dasgupta, and O. Wolfson. Optimal placement of models in trees with read, write, and storage costs. IEEE Transactions on Parallel and Computational Clusters. Vol 12, No. 6. 2001. [7] D. Kossmann. The state of the art in distributed query processing. ACM Computing Surveys (CSUR). Volume 32, Issue 4. December 2000. [8]Z. Lu and K. S. McKinley. Partial collection replication versus cache for information retrieval systems. In Proceedings of the ACM International Conference on Research and Development in Information Retrieval, Athens, Greece, July 2000. [9] V. Paxson, End-to-End Routing Behavior in the Internet, IEEE/ACM Transactions Networking, 5(5) (1997) 601-615. [10] J. Sidell, P. Aoki, A. Sah, C. Staelin, M. Stonebrakeer, and A. Yu. Data replication in Mariposa. In Proceedings IEEE Conference on Data Engineering (New Orleans, LA, Feb.), 485–494. 1996. [11] A. Sousa, F Pedone, R Oliveira, and F Moura. Partial replication in the database state machine. In Proceedings of the IEEE International Symposium on Network computing and Applications. 2001. [12] M. Tu, P. Li, L. Xiao I. Yen, and F. Bastani. Model placement algorithms for mobile transaction systems. IEEE Transactions on Knowledge and Data Engineering. Vol. 18, No. 7. 2006. [13] M. Tu. A data management framework for secure and dependable data grid. Ph.DDissertation, UT Dallas. http://www.utdallas.edu/~tumh2000/ref/Thesis-Tu.pdf. July 2006. [14] O. Wolfson and A. Milo. The multicast policy and its relationship to modelted data placement. ACM Trans. Database Systems. Vol.16, No.1. 1991 [15] O. Wolfson, S. Jajodia and Y. Huang. An adaptive data replication algorithm. ACM Transactions on database systems. Vol22. No.2 pages 255-314. 1997. [16] Lanier Watkins, William H. Robinson, Raheem A. Beyah: A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters. IEEE Transactions on Network and Service Management 7(4): 218-230 (2010)