SlideShare a Scribd company logo
1 of 6
Download to read offline
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 64 | P a g e
The application of queue theory in cloud computing to reduce the
waiting time
N.N. Bharkad*, Dr. M.H. Durge**
*Department of Mathematics, Institute of Technology & Management, Nanded-431 602, MS, India.
**Department of Mathematics, A.N. College of Arts, Commerce & Science,
Anandwan, Warora, Dist. Chandrapur, MS, India.
ABSTRACT
Cloud computing is a new technology in computer field to provide on line service to the customers. -Cloud
computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service
of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) requests
Cloud computing Service Provider (CCSP) to use the resources, if server is available, the arriving user will seize
and hold it for a length of time, which leads to queue length and more waiting time. A new arrival leaves the
queue with no service. After service completion the server is made immediately available to others. From the
user’s point of view he needs to be served immediately and to prevent waiting the CCSP’s can use infinite
servers to reduce waiting time & queue length. The arrival pattern is often Poisson in queuing theory. In this
article we analyzed the dynamic behavior of the system with infinite servers by finding various effective
measures like response time, average time spend in the system, utilization and throughput.
Keywords- Cloud computing, Poisson process, Queueing theory, Waiting time.
I. INTRODUCTION
When you store your data online instead of on
your home computer, or use web mail or a social
networking site, you are using a “cloud computing”
service. If you are an organization, and you want to
use, for example, an online invoicing service instead
of updating the in-house one you have been using for
many years, that online invoicing service is a “cloud
computing” service.Cloud computing refers to the
delivery of computing resources over the Internet.
Instead of keeping data on your own hard drive or
updating applications for your needs, you use a
service over the Internet, at another location, to store
your information or use its applications. Doing so
may give rise to certain privacy implications.
II. CLOUD COMPUTING
Cloud computing is the delivery of computing
services over the Internet. Cloud services allow
individuals and businesses to use software and
hardware that are managed by third parties at remote
locations. Examples of cloud services include online
file storage, social networking sites, web mail, and
online business applications. The cloud computing
model allows access to information and computer
resources from anywhere that a network connection
is available. Cloud computing provides a shared pool
of resources, including data storage space, networks,
computer processing power, and specialized
corporate and user applications. [1]
The following definition of cloud computing has
been developed by the U.S. National Institute of
Standards and Technology (NIST):
Cloud computing is a model for enabling convenient,
on-demand network access to a shared pool of
configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can
be rapidly provisioned and released with minimal
management effort or service provider interaction.
This cloud model promotes availability and is
composed of five essential characteristics, three
service models, and four deployment models.1
A) Characteristics
The characteristics of cloud computing include
on-demand self service, broad network access,
resource pooling, rapid elasticity and measured
service. On-demand self service means that
customers (usually organizations) can request and
manage their own computing resources. Broad
network access allows services to be offered over the
Internet or private networks. Pooled resources means
that customers draw from a pool of computing
resources, usually in remote data centres. Services
can be scaled larger or smaller; and use of a service is
measured and customers are billed accordingly.
B) Service models
The cloud computing service models are
Software as a Service (SaaS), Platform as a Service
RESEARCH ARTICLE OPEN ACCESS
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 65 | P a g e
(PaaS) and Infrastructure as a Service (IaaS). In
Software as a Service model, a pre-made application,
along with any required software, operating system,
hardware, and network are provided. In PaaS, an
operating system, hardware, and network are
provided, and the customer installs or develops its
own software and applications. The IaaS model
provides just the hardware and network; the customer
installs or develops its own operating systems,
software and applications.
C) Deployment of cloud services:
Cloud services are typically made available via a
private cloud, community cloud, public cloud or
hybrid cloud. Generally speaking, services provided
by a public cloud are offered over the Internet and are
owned and operated by a cloud provider. Some
examples include services aimed at the general
public, such as online photo storage services, e-mail
services, or social networking sites. However,
services for enterprises can also be offered in a public
cloud. In a private cloud, the cloud infrastructure is
operated solely for a specific organization, and is
managed by the organization or a third party. In a
community cloud, the service is shared by several
organizations and made available only to those
groups. The infrastructure may be owned and
operated by the organizations or by a cloud service
provider.
III. QUEUEING THEORY
A queuing system consists of one or more
servers that provide service of some sort to arriving
customers. Customers who arrive to find all servers
busy generally join one or more queues (lines) in
front of the servers, hence the name queuing
systems. There are several everyday examples that
can be described as queuing systems, such as bank-
teller service, computer systems, manufacturing
systems, maintenance systems, communications
systems and so on. [2]
A) STUCTURE OF QUEUEING SYSTEM:
B) COMPONENTS OF QUEUE SYSTEM:
A queuing system can be completely described by
a) Arrival pattern (input) ii) Service pattern (service
mechanism) iii) Queue discipline iv) customer
behavior
i) Arrival pattern (input): It represent the pattern in
which the customers arrive and join the system.
Usually, the customers arrive in a more and less
random way which is not worth making prediction.
Thus the pattern can be described in terms of
probabilities and consequently the probability
distribution of for inter arrival times must be defined.
The present paper is only dealt with those queuing
systems in which the the customers arrive in Poisson
or completely random fashion. Other types of
arrival pattern may also be observed in practice that
has been studied in queuing theory. Two such
patterns are arrivals are of regular intervals and
there is general distribution of time between
successive arrivals.
ii) Service pattern (service mechanism): It is
specified when it is known how many customers can
served at a time, what the statistical distribution of
service is, and when service is available. It is true in
most situations that service time is a random variable
with the same distribution for all arrivals, but cases
occur where there are clearly two or more classes of
customers each with a different service time
distribution. Service time may be constant or a
random variable. Distributions of service time which
are important in practice are negative exponential
distribution and the related Erlang (Gamma)
distribution.
In the present paper only those queuing systems are
discussed in which the service time follows the
exponential distribution.
iii) Queue discipline: it is the rule by which
customers selected from the queue for service. The
most common discipline is FIFO(first in ,first out) or
FCFFS( first come ,first out),according to which the
customers are served in the order of their arrival and
the other service disciplines are :
LIFO-last in, first out or FILO-fist in last out
SIRO- Service in random order and Priority.
In this paper we shall be concerned only with first
come first serve discipline (FCFS).
iv) Customer behavior: The customers generally
behave in the following three ways:
1) Balking: A customer may leave the queue because
the queue is very long and s/he has no time to wait or
there is no sufficient waiting space.
2) Reneging: This occurs when a waiting customer
leaves the queue due to impatience.
3) Jockeying: Customers may jockey from one
waiting line to another.[3]
Transient and Steady states:
Queuing Theory analyses the study of systems
behavior over time. A system is said to be transient
state when its operating characteristics are dependent
on time.
A system is said to be transient state when its
operating characteristics are independent on time.
In some situations if the arrival rate of the system is
larger than its service rate a steady state cannot be
reached regardless of the length of the elapsed time.
In fact in this case the queue length will increase with
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 66 | P a g e
time and theoretically it could build up to infinite
such case is called explosive case.
In this paper only steady state analysis will be
considered.
C) Kendall Notation
D.G. Kendall developed a notation that has been
widely accepted for specifying the pattern of arrivals,
the service time distribution, and the number of
channels in a queuing model. This notation is often
seen in software for queuing model. The basic three-
symbol Kendall notation is in the form: arrival
distribution/service time distribution/number of
service channels open. Where specific letters are used
to represent probability distributions. An abridged
version of this convention is based on the format
A/B/C/D/E/F. These letters represent the following
system characteristics:[4]
A = represents the inter arrival-time distribution.
B = represents the service-time distribution.
[Common symbols for A and B include M
(exponential), D (constant or deterministic), Ek (
Erlang of order k), and G(arbitrary or general)]
C = represents the number of parallel servers.
D = represents the queue discipline.
E = represents the system capacity.
F = represents the size of the population.
D) Single-Channel Queuing Model with
Poisson Arrivals and Exponential Service
Times (M/M/1):
We present an analytical approach to determine
important measures of performance in a typical
service system. After these numeric measures have
been computed, it will be possible to add in cost data
and begin to make decisions that balance desirable
service levels with waiting line service costs.
Assumptions of the Model
The single-channel, single-phase model considered
here is one of the most widely used and simplest
queuing models. It involves assuming that seven
conditions exist:
1. Arrivals are served on a FIFO basis.
2. Arrivals are described by a Poisson probability
distribution and come from an infinite or very large
population.
3. Service times also vary from one customer to the
next and are independent of one another, but their
average rate is known.
4. Service times occur according to the negative
exponential probability distribution.
5. The average service rate is greater than the average
arrival rate.
When these five conditions are met, we can develop a
series of equations that define the queue’s operating
characteristics.
IV. QUEUING EQUATIONS
 = mean number of arrivals per time period .
µ = mean number of people or items served per time
period
When determining the arrival rate (  ) and the
service rate (µ), the same time period must be
Used. For example, if the is the average number of
arrivals per hour, then must indicate the average
number that could be served per hour.[5]
1) Average number of units the in the
system : Ls =  
2) Average number of units the in the queue :
Lq =   
2
3) Average waiting time of an arrival in the
system : Ws =  1
4) Average waiting time of an arrival in the
queue : Wq =
)( 


5) Variance of queue length =
2
)1(





6) The utilization factor for the system :
 =


7) Probability of queue being greater than or
equal to k:P(n )k =
k
)(


8) The present idle time, that is, the probability
that no one is in the system:P0=1-


E) Multiple-Channel Queuing Model With
Poisson Arrivals And Exponential service Times
(M/M/S):
The next logical step is to look at a multiple-channel
queuing system, in which two or more servers or
channels are available to handle arriving passengers.
Let us still assume that travelers awaiting service
form one single line and then proceed to the first
available server. Each of these channels has an
independent and identical exponential service time
distribution with mean 1/ µ .The arrival process is
Poisson with rate  . Arrivals will join a single
queue and enter the first available service
channel.The multiple-channel system presented here
again assumes that arrivals follow a Poisson
probability distribution and that service times are
distributed exponentially. Service is first come, first
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 67 | P a g e
served, and all servers are assumed to perform at the
same rate.Other assumptions listed earlier for the
single-channel model apply as well.[6,7]
Equations for the Multichannel queuing Model:
If we let
 = average arrival rate, and
µ = average service rate at each channel.
C= number of parallel service channels
Pn=probability of n customers in the system
n =number of customers in the system
The following formulas may be used in the waiting
line analysis
1) Probability of the system shall be idle:
2) average number of customers in the queue :
3) average number of customers in the system:
Ls=Lq+


4) average number of customers in the system:
Wq=

qL
5) average number of customers in the system:
Ws=

sL
6) probability of a customer has to wait:
P(n
   0
!1
) P
cc
c
c













7) probability of a customer enters the service
without waiting =1-P(n≥c)
8) Utilization factor :



c

F)Numerical example results and analysis:
We are taken some examples and calculated there
different parameters as given in the following Tables
For M/M/1 model
Sr.
no.
   Ls Lq Ws Wq
1 12 5 2.4 -1.71 -4.10 -0.14 -0.34
2 15 6 2.5 -1.67 -4.17 -0.11 -0.27
3 17 6 2.8 -1.54 -4.31 -0.9 -0.25
4 20 7 2.9 -1.54 -4.46 -0.7 -0.20
5 23 8 2.9 -1.53 -4.48 -0.7 -0.20
6 22 8 2.7 -1.57 -4.28 -0.7 -0.19
7 26 9 2.9 -1.53 -4.48 -0.6 -0.17
8 21 8 2.6 -1.61 -4.18 -0.8 -0.21
9 20 8 2.5 -1.67 -4.17 -0.8 -0.20
10 17 6 2.8 -1.54 -4.31 -0.9 -0.25
11 20 7 2.9 -1.54 -4.47 -0.8 -0.23
12 20 8 2.5 -1.67 -4.17 -0.8 -0.20
13 17 6 2.8 -1.54 -4.31 -0.9 -0.23
14 15 7 2.1 -1.88 -3.95 -0.12 -0.25
15 13 6 2.2 -1.86 -4.9 -0.14 -0.30
16 10 6 1.7 -2.5 -4.25 -0.25 -0.42
For M/M/2 model
Sr.
no.     P0 Lq Ls Wq Ws
1 12 5 2.4 1.20 -
0.09
-7.7 -6.5 -0.64 -
0.54
2 15 6 2.5 1.25 -
0.11
-10.7 -9.45 -0.71 -
0.63
3 17 6 2.8 1.40 -
0.17
-5.8 -4.4 -0.34 -
0.31
4 20 7 2.9 1.45 -
0.18
-5.4 -3.95 -0.27 -
0.19
5 23 8 2.9 1.45 -
0.18
-5.4 -3.95 -0.23 -
0.17
6 22 8 2.7 1.35 -
0.14
-7.65 -6.3 -0.34 -
0.28
7 26 9 2.9 1.45 -
0.18
-5.4 -3.95 -0.20 -
0.15
8 21 8 2.6 1.30 -
0.13
-6.34 -5 -0.30 -
0.23
9 20 8 2.5 1.25 -
0.11
-10.7 -9.45 -0.53 -
0.47
10 17 6 2.8 1.40 -
0.11
-5.8 -4.4 -0.34 -
0.26
11 20 7 2.9 1.45 -
0.18
-5.4 -3.95 -0.27 -
0.20
12 20 8 2.5 1.25 -
0.11
-10.7 -9.45 -0.53 -
0.47
13 17 6 2.8 1.40 -
0.17
-5.8 -4.4 -0.34 -
0.26
14 15 7 2.1 1.05 -
0.02
-
18.52
-
17.47
-1.2 -
1.16
15 13 6 2.2 1.10 -
0.04
-
10.64
-9.54 -0.81 -
0.73
16 10 6 1.7 0.85 0.08 4.35 5.2 0.435 0.52l
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 68 | P a g e
For M/M/3 model
Sr
.
no
.
    P0 Lq Ls Wq Ws
1 12 5 2.
4
0.8
0
0.05
6
2.58 3.38 0.21
5
0.28
2
2 15 6 2.
5
0.8
3
0.04
5
3.36 4.19 0.22
4
0.27
9
3 17 6 2.
8
0.9
4
0.01
4
13.3
7
14.3
1
0.78
6
0.84
2
4 20 7 2.
9
0.9
5
0.01
1
16.9
9
17.9
4
0.84
9
0.89
7
5 23 8 2.
9
0.9
5
0.01
1
16.9
9
17.9
4
0.73
8
0.78
6 22 8 2.
7
0.9
2
0.02
0
9.43 10.3
5
0.42
8
0.47
7 26 9 2.
9
0.9
6
0.01
0
24.3
8
25.3
4
0.93
7
0.97
8 21 8 2.
6
0.8
7
0.03
5
5.27
8
6.14
8
0.25
1
0.29
2
9 20 8 2.
5
0.8
3
0.04
5
3.36 4.19 0.20
9
0.20
9
10 17 6 2.
8
0.9
4
0.01
4
13.3
7
14.3
1
0.84
2
0.84
2
11 20 7 2.
9
0.9
5
0.01
1
16.9
9
17.9
4
0.84
9
0.89
7
12 20 8 2.
5
0.8
3
0.04
5
3.36 4.19 0.16
8
0.20
9
13 17 6 2.
8
0.9
4
0.01
4
13.3
7
14.3
1
0.78
6
0.02
6
14 15 7 2.
1
0.7
1
0.09
4
1.22
5
1.93
5
0.08
2
0.12
9
15 13 6 2.
2
0.7
2
0.08
3
1.87
9
2.59
9
0.14
4
0.19
9
16 10 6 1.
7
0.5
5
0.16
9
0.37
6
0.09
2
0.03
7
0.09
2
Graph of M/M/1
Graph of M/M/2
Graph of M/M/3
V. CONCLUSION
The aim of this work is to develop an efficient
procedure for cloud computing queuing. From the
above study it is clear that to reduce the waiting time
of customer, we have needed to increase to three
number of service channels. This work do not include
both waiting as well as service cost due to non
availability of required data. In further study the cost
factor will be considered to find better cloud
computing queuing.
REFERENCES
[1] Huimin Xiao, Guozheng Zhang, The Queuing
Theory Application in Bank Service
Optimization, IEEE 2010.
[2] Hao-peng CHEN, Shao-chong Li.A,
“Queueing-based Model for Performance
Management on Cloud”, Proceedings of
IEEE International conference on Advanced
Information Managements and Services
2010, pp.83-88.
[3] R.D Mei, and H.B Meeuwissen, “modeling
end-to-end Quality-of-Service for
transaction-based services in multi-domain
environment”, In performance Challenges for
Efficient Next Generation Networks (Eds. X.J.
Liang, Z.H. Xin, V.B Iversen. and G.S. Kuo),
N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69
www.ijera.com 69 | P a g e
Proceedings of the 19th International Tele
traffic Congress (ITC19), Beijing, China
,Aug 2005 pp. 1109-1121.
[4] Kaiqi Xiong and Harry Perros, “Service
Performance and Analysis in Cloud
Computing”, ICWS in Proc International
workshop on Cloud Computing, July,6-
10(2009),LA,2009.
[5] P. Suresh varma, A. Satyanarayana, Rama
sundari M.V, “Performance Analysis of
Cloud Computing Using Queuing Models”,
International conference on cloud computing
technologies and management (ICCCTAM-
12), IEEE, 8-10 dec 2012, pp 12-15.
[6] Luqun Li, “An Optimistic Differentiated
Service Job Scheduling System for Cloud
Computing Service Users and Providers”,
Third International Conference on
Multimedia and Ubiquitous
Engineering,2009.
[7] T.Sai Sowjanya, D.Praveen, K.Satish,
A.Rahmain, “The Queueing Theory in Cloud
Computing to Reduce the waiting Time”,
IJCSET, April-2011.

More Related Content

What's hot

Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Publishing House
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeeSAT Journals
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsijdms
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelTELKOMNIKA JOURNAL
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudseSAT Publishing House
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Messageijtsrd
 

What's hot (19)

Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computingeA challenge for security and service level agreement in cloud computinge
A challenge for security and service level agreement in cloud computinge
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
A044030110
A044030110A044030110
A044030110
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation model
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
El35782786
El35782786El35782786
El35782786
 
Fe24972976
Fe24972976Fe24972976
Fe24972976
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Message
 
K1803036872
K1803036872K1803036872
K1803036872
 

Viewers also liked

Tutorials--Graphs of Exponential Functions
Tutorials--Graphs of Exponential FunctionsTutorials--Graphs of Exponential Functions
Tutorials--Graphs of Exponential FunctionsMedia4math
 
Cadeira Fixa Escritório Anguilla - cinza j serrano
Cadeira Fixa Escritório Anguilla - cinza j serranoCadeira Fixa Escritório Anguilla - cinza j serrano
Cadeira Fixa Escritório Anguilla - cinza j serranoIndústria das Cadeiras
 
Métricas e monitoramento - Uma nova abordagem das redes sociais
Métricas e monitoramento - Uma nova abordagem das redes sociaisMétricas e monitoramento - Uma nova abordagem das redes sociais
Métricas e monitoramento - Uma nova abordagem das redes sociaisTrianons
 
Metricas e ferramentas de performance - Palestra DigitalizeME 2013
Metricas e ferramentas de performance - Palestra DigitalizeME 2013Metricas e ferramentas de performance - Palestra DigitalizeME 2013
Metricas e ferramentas de performance - Palestra DigitalizeME 2013Trianons
 
Roy Thorvaldsen BIO 2016
Roy Thorvaldsen BIO 2016Roy Thorvaldsen BIO 2016
Roy Thorvaldsen BIO 2016Roy Thorvaldsen
 
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...B & M Co., Ltd.
 
La construcción de patrimonios culturales
La construcción de patrimonios culturalesLa construcción de patrimonios culturales
La construcción de patrimonios culturalesRoberto Córdoba
 
Giioto ( Trabalho de Artes )
Giioto ( Trabalho de Artes )Giioto ( Trabalho de Artes )
Giioto ( Trabalho de Artes )Marcelo Penido
 
Актуальные проблемы информирования и просвещения молодежи основным принципам ...
Актуальные проблемы информирования и просвещения молодежи основным принципам ...Актуальные проблемы информирования и просвещения молодежи основным принципам ...
Актуальные проблемы информирования и просвещения молодежи основным принципам ...rorbic
 
Photos Kyoto by Paco Barbera
 Photos  Kyoto by Paco Barbera Photos  Kyoto by Paco Barbera
Photos Kyoto by Paco BarberaB & M Co., Ltd.
 

Viewers also liked (20)

Tutorials--Graphs of Exponential Functions
Tutorials--Graphs of Exponential FunctionsTutorials--Graphs of Exponential Functions
Tutorials--Graphs of Exponential Functions
 
Success Story Spreads
Success Story SpreadsSuccess Story Spreads
Success Story Spreads
 
Sidem crtfct
Sidem crtfctSidem crtfct
Sidem crtfct
 
Cavalos1
Cavalos1Cavalos1
Cavalos1
 
Cadeira Fixa Escritório Anguilla - cinza j serrano
Cadeira Fixa Escritório Anguilla - cinza j serranoCadeira Fixa Escritório Anguilla - cinza j serrano
Cadeira Fixa Escritório Anguilla - cinza j serrano
 
Métricas e monitoramento - Uma nova abordagem das redes sociais
Métricas e monitoramento - Uma nova abordagem das redes sociaisMétricas e monitoramento - Uma nova abordagem das redes sociais
Métricas e monitoramento - Uma nova abordagem das redes sociais
 
LMT 4G internets telefonā
LMT 4G internets telefonāLMT 4G internets telefonā
LMT 4G internets telefonā
 
Metricas e ferramentas de performance - Palestra DigitalizeME 2013
Metricas e ferramentas de performance - Palestra DigitalizeME 2013Metricas e ferramentas de performance - Palestra DigitalizeME 2013
Metricas e ferramentas de performance - Palestra DigitalizeME 2013
 
Marketing Digital : Eiden
Marketing Digital : EidenMarketing Digital : Eiden
Marketing Digital : Eiden
 
Gráf
GráfGráf
Gráf
 
Cadeira Caixa Anguila - Preta Space
Cadeira Caixa Anguila - Preta SpaceCadeira Caixa Anguila - Preta Space
Cadeira Caixa Anguila - Preta Space
 
Roy Thorvaldsen BIO 2016
Roy Thorvaldsen BIO 2016Roy Thorvaldsen BIO 2016
Roy Thorvaldsen BIO 2016
 
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...
Felicitaciones Navidad amigos/as Facebook Christmas greetings friends as Face...
 
Acheivements
AcheivementsAcheivements
Acheivements
 
La construcción de patrimonios culturales
La construcción de patrimonios culturalesLa construcción de patrimonios culturales
La construcción de patrimonios culturales
 
Giioto ( Trabalho de Artes )
Giioto ( Trabalho de Artes )Giioto ( Trabalho de Artes )
Giioto ( Trabalho de Artes )
 
Poligonos
PoligonosPoligonos
Poligonos
 
Актуальные проблемы информирования и просвещения молодежи основным принципам ...
Актуальные проблемы информирования и просвещения молодежи основным принципам ...Актуальные проблемы информирования и просвещения молодежи основным принципам ...
Актуальные проблемы информирования и просвещения молодежи основным принципам ...
 
Multiplos y divisores septimo
Multiplos y divisores septimoMultiplos y divisores septimo
Multiplos y divisores septimo
 
Photos Kyoto by Paco Barbera
 Photos  Kyoto by Paco Barbera Photos  Kyoto by Paco Barbera
Photos Kyoto by Paco Barbera
 

Similar to The application of queue theory in cloud computing to reduce the waiting time

Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsIJEEE
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computingeSAT Journals
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptxtaruian
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingSteven Wallach
 
Cloud computing 1 introduction
Cloud computing 1 introductionCloud computing 1 introduction
Cloud computing 1 introductionVaibhav Khanna
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxdaniahendric
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1ADEOLA ADISA
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 

Similar to The application of queue theory in cloud computing to reduce the waiting time (20)

T04503113118
T04503113118T04503113118
T04503113118
 
Cloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithmsCloud computing Review over various scheduling algorithms
Cloud computing Review over various scheduling algorithms
 
D045031724
D045031724D045031724
D045031724
 
An assessment of cloud computing
An assessment of cloud computingAn assessment of cloud computing
An assessment of cloud computing
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
Associated IoT Technologies.pptx
Associated IoT Technologies.pptxAssociated IoT Technologies.pptx
Associated IoT Technologies.pptx
 
A Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud ComputingA Comprehensive Study On Cloud Computing
A Comprehensive Study On Cloud Computing
 
Cloud computing 1 introduction
Cloud computing 1 introductionCloud computing 1 introduction
Cloud computing 1 introduction
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
Across the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docxAcross the world, governments are trying to present, in the best p.docx
Across the world, governments are trying to present, in the best p.docx
 
Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
Total interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computingTotal interpretive structural modelling on enablers of cloud computing
Total interpretive structural modelling on enablers of cloud computing
 
Cloud computing lecture 1
Cloud computing lecture 1Cloud computing lecture 1
Cloud computing lecture 1
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 

The application of queue theory in cloud computing to reduce the waiting time

  • 1. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 64 | P a g e The application of queue theory in cloud computing to reduce the waiting time N.N. Bharkad*, Dr. M.H. Durge** *Department of Mathematics, Institute of Technology & Management, Nanded-431 602, MS, India. **Department of Mathematics, A.N. College of Arts, Commerce & Science, Anandwan, Warora, Dist. Chandrapur, MS, India. ABSTRACT Cloud computing is a new technology in computer field to provide on line service to the customers. -Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) requests Cloud computing Service Provider (CCSP) to use the resources, if server is available, the arriving user will seize and hold it for a length of time, which leads to queue length and more waiting time. A new arrival leaves the queue with no service. After service completion the server is made immediately available to others. From the user’s point of view he needs to be served immediately and to prevent waiting the CCSP’s can use infinite servers to reduce waiting time & queue length. The arrival pattern is often Poisson in queuing theory. In this article we analyzed the dynamic behavior of the system with infinite servers by finding various effective measures like response time, average time spend in the system, utilization and throughput. Keywords- Cloud computing, Poisson process, Queueing theory, Waiting time. I. INTRODUCTION When you store your data online instead of on your home computer, or use web mail or a social networking site, you are using a “cloud computing” service. If you are an organization, and you want to use, for example, an online invoicing service instead of updating the in-house one you have been using for many years, that online invoicing service is a “cloud computing” service.Cloud computing refers to the delivery of computing resources over the Internet. Instead of keeping data on your own hard drive or updating applications for your needs, you use a service over the Internet, at another location, to store your information or use its applications. Doing so may give rise to certain privacy implications. II. CLOUD COMPUTING Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Examples of cloud services include online file storage, social networking sites, web mail, and online business applications. The cloud computing model allows access to information and computer resources from anywhere that a network connection is available. Cloud computing provides a shared pool of resources, including data storage space, networks, computer processing power, and specialized corporate and user applications. [1] The following definition of cloud computing has been developed by the U.S. National Institute of Standards and Technology (NIST): Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.1 A) Characteristics The characteristics of cloud computing include on-demand self service, broad network access, resource pooling, rapid elasticity and measured service. On-demand self service means that customers (usually organizations) can request and manage their own computing resources. Broad network access allows services to be offered over the Internet or private networks. Pooled resources means that customers draw from a pool of computing resources, usually in remote data centres. Services can be scaled larger or smaller; and use of a service is measured and customers are billed accordingly. B) Service models The cloud computing service models are Software as a Service (SaaS), Platform as a Service RESEARCH ARTICLE OPEN ACCESS
  • 2. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 65 | P a g e (PaaS) and Infrastructure as a Service (IaaS). In Software as a Service model, a pre-made application, along with any required software, operating system, hardware, and network are provided. In PaaS, an operating system, hardware, and network are provided, and the customer installs or develops its own software and applications. The IaaS model provides just the hardware and network; the customer installs or develops its own operating systems, software and applications. C) Deployment of cloud services: Cloud services are typically made available via a private cloud, community cloud, public cloud or hybrid cloud. Generally speaking, services provided by a public cloud are offered over the Internet and are owned and operated by a cloud provider. Some examples include services aimed at the general public, such as online photo storage services, e-mail services, or social networking sites. However, services for enterprises can also be offered in a public cloud. In a private cloud, the cloud infrastructure is operated solely for a specific organization, and is managed by the organization or a third party. In a community cloud, the service is shared by several organizations and made available only to those groups. The infrastructure may be owned and operated by the organizations or by a cloud service provider. III. QUEUEING THEORY A queuing system consists of one or more servers that provide service of some sort to arriving customers. Customers who arrive to find all servers busy generally join one or more queues (lines) in front of the servers, hence the name queuing systems. There are several everyday examples that can be described as queuing systems, such as bank- teller service, computer systems, manufacturing systems, maintenance systems, communications systems and so on. [2] A) STUCTURE OF QUEUEING SYSTEM: B) COMPONENTS OF QUEUE SYSTEM: A queuing system can be completely described by a) Arrival pattern (input) ii) Service pattern (service mechanism) iii) Queue discipline iv) customer behavior i) Arrival pattern (input): It represent the pattern in which the customers arrive and join the system. Usually, the customers arrive in a more and less random way which is not worth making prediction. Thus the pattern can be described in terms of probabilities and consequently the probability distribution of for inter arrival times must be defined. The present paper is only dealt with those queuing systems in which the the customers arrive in Poisson or completely random fashion. Other types of arrival pattern may also be observed in practice that has been studied in queuing theory. Two such patterns are arrivals are of regular intervals and there is general distribution of time between successive arrivals. ii) Service pattern (service mechanism): It is specified when it is known how many customers can served at a time, what the statistical distribution of service is, and when service is available. It is true in most situations that service time is a random variable with the same distribution for all arrivals, but cases occur where there are clearly two or more classes of customers each with a different service time distribution. Service time may be constant or a random variable. Distributions of service time which are important in practice are negative exponential distribution and the related Erlang (Gamma) distribution. In the present paper only those queuing systems are discussed in which the service time follows the exponential distribution. iii) Queue discipline: it is the rule by which customers selected from the queue for service. The most common discipline is FIFO(first in ,first out) or FCFFS( first come ,first out),according to which the customers are served in the order of their arrival and the other service disciplines are : LIFO-last in, first out or FILO-fist in last out SIRO- Service in random order and Priority. In this paper we shall be concerned only with first come first serve discipline (FCFS). iv) Customer behavior: The customers generally behave in the following three ways: 1) Balking: A customer may leave the queue because the queue is very long and s/he has no time to wait or there is no sufficient waiting space. 2) Reneging: This occurs when a waiting customer leaves the queue due to impatience. 3) Jockeying: Customers may jockey from one waiting line to another.[3] Transient and Steady states: Queuing Theory analyses the study of systems behavior over time. A system is said to be transient state when its operating characteristics are dependent on time. A system is said to be transient state when its operating characteristics are independent on time. In some situations if the arrival rate of the system is larger than its service rate a steady state cannot be reached regardless of the length of the elapsed time. In fact in this case the queue length will increase with
  • 3. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 66 | P a g e time and theoretically it could build up to infinite such case is called explosive case. In this paper only steady state analysis will be considered. C) Kendall Notation D.G. Kendall developed a notation that has been widely accepted for specifying the pattern of arrivals, the service time distribution, and the number of channels in a queuing model. This notation is often seen in software for queuing model. The basic three- symbol Kendall notation is in the form: arrival distribution/service time distribution/number of service channels open. Where specific letters are used to represent probability distributions. An abridged version of this convention is based on the format A/B/C/D/E/F. These letters represent the following system characteristics:[4] A = represents the inter arrival-time distribution. B = represents the service-time distribution. [Common symbols for A and B include M (exponential), D (constant or deterministic), Ek ( Erlang of order k), and G(arbitrary or general)] C = represents the number of parallel servers. D = represents the queue discipline. E = represents the system capacity. F = represents the size of the population. D) Single-Channel Queuing Model with Poisson Arrivals and Exponential Service Times (M/M/1): We present an analytical approach to determine important measures of performance in a typical service system. After these numeric measures have been computed, it will be possible to add in cost data and begin to make decisions that balance desirable service levels with waiting line service costs. Assumptions of the Model The single-channel, single-phase model considered here is one of the most widely used and simplest queuing models. It involves assuming that seven conditions exist: 1. Arrivals are served on a FIFO basis. 2. Arrivals are described by a Poisson probability distribution and come from an infinite or very large population. 3. Service times also vary from one customer to the next and are independent of one another, but their average rate is known. 4. Service times occur according to the negative exponential probability distribution. 5. The average service rate is greater than the average arrival rate. When these five conditions are met, we can develop a series of equations that define the queue’s operating characteristics. IV. QUEUING EQUATIONS  = mean number of arrivals per time period . µ = mean number of people or items served per time period When determining the arrival rate (  ) and the service rate (µ), the same time period must be Used. For example, if the is the average number of arrivals per hour, then must indicate the average number that could be served per hour.[5] 1) Average number of units the in the system : Ls =   2) Average number of units the in the queue : Lq =    2 3) Average waiting time of an arrival in the system : Ws =  1 4) Average waiting time of an arrival in the queue : Wq = )(    5) Variance of queue length = 2 )1(      6) The utilization factor for the system :  =   7) Probability of queue being greater than or equal to k:P(n )k = k )(   8) The present idle time, that is, the probability that no one is in the system:P0=1-   E) Multiple-Channel Queuing Model With Poisson Arrivals And Exponential service Times (M/M/S): The next logical step is to look at a multiple-channel queuing system, in which two or more servers or channels are available to handle arriving passengers. Let us still assume that travelers awaiting service form one single line and then proceed to the first available server. Each of these channels has an independent and identical exponential service time distribution with mean 1/ µ .The arrival process is Poisson with rate  . Arrivals will join a single queue and enter the first available service channel.The multiple-channel system presented here again assumes that arrivals follow a Poisson probability distribution and that service times are distributed exponentially. Service is first come, first
  • 4. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 67 | P a g e served, and all servers are assumed to perform at the same rate.Other assumptions listed earlier for the single-channel model apply as well.[6,7] Equations for the Multichannel queuing Model: If we let  = average arrival rate, and µ = average service rate at each channel. C= number of parallel service channels Pn=probability of n customers in the system n =number of customers in the system The following formulas may be used in the waiting line analysis 1) Probability of the system shall be idle: 2) average number of customers in the queue : 3) average number of customers in the system: Ls=Lq+   4) average number of customers in the system: Wq=  qL 5) average number of customers in the system: Ws=  sL 6) probability of a customer has to wait: P(n    0 !1 ) P cc c c              7) probability of a customer enters the service without waiting =1-P(n≥c) 8) Utilization factor :    c  F)Numerical example results and analysis: We are taken some examples and calculated there different parameters as given in the following Tables For M/M/1 model Sr. no.    Ls Lq Ws Wq 1 12 5 2.4 -1.71 -4.10 -0.14 -0.34 2 15 6 2.5 -1.67 -4.17 -0.11 -0.27 3 17 6 2.8 -1.54 -4.31 -0.9 -0.25 4 20 7 2.9 -1.54 -4.46 -0.7 -0.20 5 23 8 2.9 -1.53 -4.48 -0.7 -0.20 6 22 8 2.7 -1.57 -4.28 -0.7 -0.19 7 26 9 2.9 -1.53 -4.48 -0.6 -0.17 8 21 8 2.6 -1.61 -4.18 -0.8 -0.21 9 20 8 2.5 -1.67 -4.17 -0.8 -0.20 10 17 6 2.8 -1.54 -4.31 -0.9 -0.25 11 20 7 2.9 -1.54 -4.47 -0.8 -0.23 12 20 8 2.5 -1.67 -4.17 -0.8 -0.20 13 17 6 2.8 -1.54 -4.31 -0.9 -0.23 14 15 7 2.1 -1.88 -3.95 -0.12 -0.25 15 13 6 2.2 -1.86 -4.9 -0.14 -0.30 16 10 6 1.7 -2.5 -4.25 -0.25 -0.42 For M/M/2 model Sr. no.     P0 Lq Ls Wq Ws 1 12 5 2.4 1.20 - 0.09 -7.7 -6.5 -0.64 - 0.54 2 15 6 2.5 1.25 - 0.11 -10.7 -9.45 -0.71 - 0.63 3 17 6 2.8 1.40 - 0.17 -5.8 -4.4 -0.34 - 0.31 4 20 7 2.9 1.45 - 0.18 -5.4 -3.95 -0.27 - 0.19 5 23 8 2.9 1.45 - 0.18 -5.4 -3.95 -0.23 - 0.17 6 22 8 2.7 1.35 - 0.14 -7.65 -6.3 -0.34 - 0.28 7 26 9 2.9 1.45 - 0.18 -5.4 -3.95 -0.20 - 0.15 8 21 8 2.6 1.30 - 0.13 -6.34 -5 -0.30 - 0.23 9 20 8 2.5 1.25 - 0.11 -10.7 -9.45 -0.53 - 0.47 10 17 6 2.8 1.40 - 0.11 -5.8 -4.4 -0.34 - 0.26 11 20 7 2.9 1.45 - 0.18 -5.4 -3.95 -0.27 - 0.20 12 20 8 2.5 1.25 - 0.11 -10.7 -9.45 -0.53 - 0.47 13 17 6 2.8 1.40 - 0.17 -5.8 -4.4 -0.34 - 0.26 14 15 7 2.1 1.05 - 0.02 - 18.52 - 17.47 -1.2 - 1.16 15 13 6 2.2 1.10 - 0.04 - 10.64 -9.54 -0.81 - 0.73 16 10 6 1.7 0.85 0.08 4.35 5.2 0.435 0.52l
  • 5. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 68 | P a g e For M/M/3 model Sr . no .     P0 Lq Ls Wq Ws 1 12 5 2. 4 0.8 0 0.05 6 2.58 3.38 0.21 5 0.28 2 2 15 6 2. 5 0.8 3 0.04 5 3.36 4.19 0.22 4 0.27 9 3 17 6 2. 8 0.9 4 0.01 4 13.3 7 14.3 1 0.78 6 0.84 2 4 20 7 2. 9 0.9 5 0.01 1 16.9 9 17.9 4 0.84 9 0.89 7 5 23 8 2. 9 0.9 5 0.01 1 16.9 9 17.9 4 0.73 8 0.78 6 22 8 2. 7 0.9 2 0.02 0 9.43 10.3 5 0.42 8 0.47 7 26 9 2. 9 0.9 6 0.01 0 24.3 8 25.3 4 0.93 7 0.97 8 21 8 2. 6 0.8 7 0.03 5 5.27 8 6.14 8 0.25 1 0.29 2 9 20 8 2. 5 0.8 3 0.04 5 3.36 4.19 0.20 9 0.20 9 10 17 6 2. 8 0.9 4 0.01 4 13.3 7 14.3 1 0.84 2 0.84 2 11 20 7 2. 9 0.9 5 0.01 1 16.9 9 17.9 4 0.84 9 0.89 7 12 20 8 2. 5 0.8 3 0.04 5 3.36 4.19 0.16 8 0.20 9 13 17 6 2. 8 0.9 4 0.01 4 13.3 7 14.3 1 0.78 6 0.02 6 14 15 7 2. 1 0.7 1 0.09 4 1.22 5 1.93 5 0.08 2 0.12 9 15 13 6 2. 2 0.7 2 0.08 3 1.87 9 2.59 9 0.14 4 0.19 9 16 10 6 1. 7 0.5 5 0.16 9 0.37 6 0.09 2 0.03 7 0.09 2 Graph of M/M/1 Graph of M/M/2 Graph of M/M/3 V. CONCLUSION The aim of this work is to develop an efficient procedure for cloud computing queuing. From the above study it is clear that to reduce the waiting time of customer, we have needed to increase to three number of service channels. This work do not include both waiting as well as service cost due to non availability of required data. In further study the cost factor will be considered to find better cloud computing queuing. REFERENCES [1] Huimin Xiao, Guozheng Zhang, The Queuing Theory Application in Bank Service Optimization, IEEE 2010. [2] Hao-peng CHEN, Shao-chong Li.A, “Queueing-based Model for Performance Management on Cloud”, Proceedings of IEEE International conference on Advanced Information Managements and Services 2010, pp.83-88. [3] R.D Mei, and H.B Meeuwissen, “modeling end-to-end Quality-of-Service for transaction-based services in multi-domain environment”, In performance Challenges for Efficient Next Generation Networks (Eds. X.J. Liang, Z.H. Xin, V.B Iversen. and G.S. Kuo),
  • 6. N.N. BharkadInt. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 10( Part -1), October 2014, pp.64-69 www.ijera.com 69 | P a g e Proceedings of the 19th International Tele traffic Congress (ITC19), Beijing, China ,Aug 2005 pp. 1109-1121. [4] Kaiqi Xiong and Harry Perros, “Service Performance and Analysis in Cloud Computing”, ICWS in Proc International workshop on Cloud Computing, July,6- 10(2009),LA,2009. [5] P. Suresh varma, A. Satyanarayana, Rama sundari M.V, “Performance Analysis of Cloud Computing Using Queuing Models”, International conference on cloud computing technologies and management (ICCCTAM- 12), IEEE, 8-10 dec 2012, pp 12-15. [6] Luqun Li, “An Optimistic Differentiated Service Job Scheduling System for Cloud Computing Service Users and Providers”, Third International Conference on Multimedia and Ubiquitous Engineering,2009. [7] T.Sai Sowjanya, D.Praveen, K.Satish, A.Rahmain, “The Queueing Theory in Cloud Computing to Reduce the waiting Time”, IJCSET, April-2011.