here the presentation gives the natural behavior of ants and how the that logic is applicable to cloud for load balancing is discussed here with detailed literature survey.
We will worked on CLOUD COMPTUING still from 2year's we had finally research many concepts releated to Cloud security, we had woking on our Idiea's and timly we will share our research concepts
A Survey on Resource Allocation in Cloud Computingneirew J
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
Synchronization in distributed computingSVijaylakshmi
Synchronization in distributed systems is achieved via clocks. The physical clocks are used to adjust the time of nodes. Each node in the system can share its local time with other nodes in the system. The time is set based on UTC (Universal Time Coordination).
We will worked on CLOUD COMPTUING still from 2year's we had finally research many concepts releated to Cloud security, we had woking on our Idiea's and timly we will share our research concepts
A Survey on Resource Allocation in Cloud Computingneirew J
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
Synchronization in distributed computingSVijaylakshmi
Synchronization in distributed systems is achieved via clocks. The physical clocks are used to adjust the time of nodes. Each node in the system can share its local time with other nodes in the system. The time is set based on UTC (Universal Time Coordination).
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Service Oriented Architecture – REST and Systems of Systems – Web Services – PublishSubscribe Model – Basics of Virtualization – Types of Virtualization – Implementation Levels ofVirtualization – Virtualization Structures – Tools and Mechanisms – Virtualization of CPU –Memory – I/O Devices –Virtualization Support and Disaster Recovery.
- Problems with traditional data centers.
- Cloud computing definition, deployment, and services models.
- Essential characteristics of cloud services.
- IaaS examples.
- PaaS examples.
- SaaS examples.
- Cloud enabling technologies such as grid computing, utility computing, service oriented architecture (SOA), The Internet, Multi-tenancy, Web 2.0, Automation and Virtualization.
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
This slide explains the design part as well as implementation part of the firewall. And also tells about the need of firewall and firewall capabilities.
Provides a simple and unambiguous taxonomy of three service models
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
(Private cloud, Community cloud, Public cloud, and Hybrid cloud)
Service Oriented Architecture – REST and Systems of Systems – Web Services – PublishSubscribe Model – Basics of Virtualization – Types of Virtualization – Implementation Levels ofVirtualization – Virtualization Structures – Tools and Mechanisms – Virtualization of CPU –Memory – I/O Devices –Virtualization Support and Disaster Recovery.
- Problems with traditional data centers.
- Cloud computing definition, deployment, and services models.
- Essential characteristics of cloud services.
- IaaS examples.
- PaaS examples.
- SaaS examples.
- Cloud enabling technologies such as grid computing, utility computing, service oriented architecture (SOA), The Internet, Multi-tenancy, Web 2.0, Automation and Virtualization.
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
This slide explains the design part as well as implementation part of the firewall. And also tells about the need of firewall and firewall capabilities.
Ant Colony (-based) Optimisation – a way to solve optimisation problems based on the way that ants indirectly communicate directions to each other we call Stigmergy.
Secured Rural Communication Development Using Mobile Ad-hoc Networkijsrd.com
Rural areas where resource of communication lacks and the area like earthquake zone require a strong communication channel. India is one of the fastest growing countries in the world but fact is there are more than 600 villages still lack the proper communications. Mobile ad-hoc network is one of the networks which often requires seamless ubiquitous network, which can be utilized to structure the wireless mode of communication, for the transmission of strategic information among mobile agents in areas where no rigid infrastructure can be set up for a network. Mobile ad-hoc network is best suited for this kind of situation because of the flexibility and scalability it offers. No central administration is required for such network, as it works on temporary connection links, making the network ubiquitous. The prime challenge in implementing such network with multi-agent communication is the need of an efficient routing protocol for multi-hop connectivity, frequently changing topology and dynamic routes. This paper proposes a new multi-agent based routing algorithm to facilitate the reliable communication in rural areas network. The proposed algorithm is named as Ant Algorithm for Mobile Ad-hoc Network. The proposed algorithm is inspired from the ant colony optimization metaheuristic and is based on swarm intelligence, uses simple node-level management with probabilistic multi-path routing which highly resembles to the behavior of real world harvester ants to find the shortest path between their nest and the food source. This paper will discuss about the security ethics of the Adhoc network. Techniques that will make MANET more secure and Algorithms for security in MANET.
Heuristic algorithms for solving TSP.doc.pptxlwz614595250
For NP problems such as TSP, when the task size is small, traditional methods can obtain the exact optimal solution; however, in real life, the problems are generally more complex and larger in size, and traditional methods require huge resources for computation and the results will not be ideal. Traditional methods are challenged. Therefore, heuristic methods are derived. Some heuristics can help us to find approximate optimal solutions. Usually, this is enough to be applied in practical situations.
In this presentation, we present the application of the basic ant colony algorithm to the tsp problem and implement it using matlab; and, conduct comparative experiments with the application of other other heuristics (particle swarm algorithm, genetic algorithm).
This is useful for beginners to understand heuristic algorithms and NP problems.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
Comparative Study of Ant Colony Optimization And Gang SchedulingIJTET Journal
Abstract— Ant Colony Optimization (ACO) is a well known and rapidly evolving meta-heuristic technique. All optimization problems have already taken advantage of the ACO technique while countless others are on their way. Ant Colony Optimization (ACO) has been used as an effective algorithm in solving the scheduling problem in grid computing. Whereas gang scheduling is a scheduling algorithm that is used to schedule the parallel systems and schedules related threads or processes to run simultaneously on different processors. The threads that are scheduled are belonging to the same process, but they from different processes in some cases, for example when the processes have a producer-consumer relationship, when all processes come from the same MPI program.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. 2
Agenda
Abstract
Introduction
Ant Colony Optimization
Natural behavior of ant
ACO for load balancing in cloud
Literature survey
Conclusion and Future scope
References
1
3. Abstract
Cloud computing refers to a parallel and distributed computing
system consisting of a collection of inter-connected and virtualized
computers that are dynamically provisioned and presented as one or
more unified computing resources based on service-level agreements
(SLA) established through negotiation between the service provider
and consumers.
Cloud load balancing is a type of load balancing that is performed
in cloud computing. Cloud load balancing is the process of
distributing workloads across multiple computing resources.
Ant Colony Optimization is basic foraging behavior of an ant that
encouraged them to find the optimal shortest path from their nest to
food introduced by Dorigo and Gam-bardella
2
4. Introduction
What is Cloud Computing?
Internet-based on demand computing.
Pay-as-you-go
Accessing Computing resources of Third party
3
5. Characteristics of cloud computing
Large scale infrastructure
Virtualization
High reliability
Universality
Easy scalability
In the form of demand requested service
Low cost
4
6. Load Balancing in cloud
Load Balancing is a method to distribute workload across one or more
servers
Load balancing is used to make sure that none of your existing resources are
idle while others are being utilized.
To balance load distribution, you can migrate the load from the heavy
loaded nodes to the comparatively lightly loaded destination nodes.
Goals of Load balancing
To improve the performance substantially
To have a backup plan in case the system fails even partially
To maintain the system stability
5
7. Ant Colony Optimization
The inspiring source of ACO is the foraging behavior of real ants. When
searching for food, ants initially explore the area surrounding their nest in a
random manner.
As soon as an ant finds a food source, it evaluates the quantity and the quality
of the food and carries some of it back to the nest.
During the return trip, the ant deposits a chemical pheromone trail on the
ground. The quantity of pheromone deposited, which may depend on the
quantity and quality of the food, will guide other ants to the food source.
Indirect communication between the ants via pheromone trails enables them to
find shortest paths between their nest and food sources. This characteristic of
real ant colonies is exploited in ant colony optimization.
6
12. Con…
Paths that have the highest pheromone intensity have the
shortest distance between the point and the best food source.
The movements of these ants independently update a solution
set.
The Traversal of ants in this system is generally of two types:
1) Forward movements-In this type of movement the ants move
for extracting the food, or searching for the food sources.
2) Backward movements-In this type of movements the ants
after picking up food from the food sources traverse back to the
nest for storing their food.
11
13. ACO for load balancing in cloud
The ACO is used for load balancing.
Ants Continuously originates from head node and traverse the width and
length of the network.
These Ants along with their traversal will be updating a pheromone table.
movement of ants in two ways similar to the classical ACO, which are as
follows:
1) Forward movement-The ants continuously move in the forward direction
in the cloud encountering overloaded node or under loaded node.
2) Backward movement-If an ant encounters an over-loaded node in its
movement when it has previously encountered an under loaded node then it
will go backward to the under loaded node to check if the node is still under
loaded or not and if it finds it still under loaded then it will redistribute the
work to the under loaded node.
Main task is to redistribute the work among the nodes.
Maintain a table for resource utilization. 12
14. Pheromone tables
Similar to routing table of a network.
The pheromone strengths are represented.
Every node has a pheromone table for every possible destination in the
network, and each table has an entry for every neighbour.
Their most frequent load type is denoted in the bracket (i.e. Overloaded-0,
Medium loaded-M, Under loaded-U) and simultaneously the calculated
pheromone table which indicates the level of particular pheromone type (i.e.
High-H, Low-L, Medium-M) between corresponding nodes.
13
15. Con….
Here L,M,H shows the probability of moving.
So the question is that probability in terms of what?
Probability is based on pheromone concentration. The equation for the
moving probability is shown in next slide. (eq-2)
And how the pheromone is calculated is based on eq-1.
13
16. What should be the pheromone??
The value of pheromone here is,
τij(t=0)=f(MIPSJ,L,BWJ)………………eq-1
Pheromone value in between two node i and j at turn t=0, MIPSJ (Million
Instructions per Second) is the maximum capacity of each processor of VMJ
The parameter BWJ is related to the communication bandwidth ability of
the VMJ.
L is the delay cost is an estimate of penalty, which cloud service provider
needs to pay to customer in the event of job finishing actual time being
more than the dead-line advertised.
14
17. Con…..
The ants traverse the cloud network, selecting nodes for their next step
through the classical formula given below, where the probability Pk of an
ant,which is currently on node r selecting the neighboring nodes for
traversal, is:
Pk(r, s) =[ τ(r, s)][η(r, s)]^β …………………….eq-2
[τ (r,u)][η(r, u)] ^β
where, r = Current node,
s = Next node,
τ= Pheromone concentration of the edge,
η = The desirability of the move for the ant (if the move is from an
under loaded node to overloaded node or vice-versa the move
will be highly desirable),
β= Depends upon the relevance of the pheromone con-centration
with the move distance.
15
18. Pheromone Updation
The ant will use two types of pheromone for its movement. The type of
pheromone being updated by the ant would signify the type of movements
of the ant and would tell about the kind of node the ant is searching for (i.e.
overloaded or underloaded node). The two types of pheromones updated by
the ants are as follows:
1) Foraging Pheromone (FP)
While moving from underloaded node to overloaded node, ant will update
FP. Equation for updating FP pheromone is
FP( t+1 ) = ( 1 - βeva )FP(t) + ∆FP
Where,
βeva = Pheromone evaporation rate
FP = Foraging pheromone of the edge before the move
FP( t+1 ) = Foraging pheromone of the edge after the move
∆FP = Change in FP
16
19. Con….
2) Trailing Pheromone (TP)
While moving from overloaded node to underloaded node, ant will
update TP. Equation for updating TP pheromone is
TP( t+1 ) = ( 1 - βeva )TP(t) + ∆TP
Where,
βeva = Pheromone evaporation rate
TP = Trailing pheromone of the edge before the move
TP( t+1 ) = Trailing pheromone of the edge after the move
∆TP = Change in TP
Since pheromones evaporate and diffuse away, the strength of the trail
when it is encountered by another ant is a function of the original
strength, and the time since the trail was laid. 17
20. Con….
βeva is pheromone evaporation factor which represents the pheromone volatilization
degree during unit time. Correspondingly, (1- βeva) represents the degree of residual
pheromone. The value of βeva is between [0, 1].
The greater the value of βeva , pheromone evaporate faster, and past searches has a
small influence on next step searching
18
21. OverloadedUnderloaded
After originating from head nodes, ant move to node called as nextnode.. The
encountered nextnode status can either be overloaded or under loaded.
Now this nextnode is became current node.Suppose, the load on
currentnode is greater than threshold i.e. status of currentnode is overloaded.
Now, ant will search for underloaded node among the neighboring nodes of
the currentnode.
Here, ant can either get all overloaded neighbors or one underloaded node
with minimum load. If ant get underloaded node then it will move to that
node and update TP otherwise, ant will select the node which has minimum
TP among neighbor nodes of currentnode and then move to that node and
then update TP.
Now, the node on which ant is moved, is became a currentnode.
Now, redistribution of load is done if and only if currentnode is
underloaded. Otherwise, it will again search for the underloaded node
among neighbor nodes of currentnode. 19
22. Underloaded Overloaded
Now suppose, the load on currentnode is less than threshold i.e. status of
currentnode is underloaded. Now, ant will search for overloaded node among the
neighboringnodes of the currentnode.
Here, ant can either get all underloaded neighbors or one overloaded node with
maximum load.
if ant get overloaded node then it will move to that node and update FP otherwise,
ant will select the node which has maximum FP among neighbor nodes of
currentnode and then move to that node and then update FP.
Now, the node on which ant is moved, is became a currentnode.
Now, redistribution of load is done if and only if currentnode is overloaded.
Otherwise, it will again search for the overloaded node among neighbor nodes of
currentnode.
20
24. Literature survey
Paper Description Pros Cons
Load Balancing of
Nodes in Cloud Using
Ant Colony
Optimization
IEEE 2012 14th
International
Conference on
Modeling and
Simulation
Ants
continuously update a
single result set rather
than updating
their own result set
•System can continue
functioning properly
even at peak usage
hours
• It gives optimum
solution of load.
• it is centralized
no single point of
failure
•.Network overhead
because of the large
number of ants
•Points of initiation
of ants and number
of ants are not clea
A Technique Based on
Ant Colony
Optimization for Load
Balancing in Cloud
Data Center
IEEE 2014 13th
International
Conference on
Information Technolog
It uses redistribution
policy and considers
number of requests.
•high availability of
resources
•increasing the
throughput
•maximum resource
utilization.
•It doesn’t consider
server’s CPU power,
memory etc
22
25. Con….
Paper Description Pros Cons
An Ant Colony Based
Load Balancing
Strategy in Cloud
Computing
Springer 2014
Advanced Computing,
Networking and
Informatics - Volume 2
soft computing based
algorithm on ant colony
optimization has been
proposed to initiate the
load balancing under
cloud computing
architecture
•guarantees the QoS
requirement
• Fault tolerance issues
does not consider
• All jobs are predicted
with same priority here,
which may not be the
actual scenario.
Ant colony
Optimization: A
Solution of Load
balancing in Cloud
International Journal
of Web & Semantic
Technology (IJWesT)
2012
A heuristic
algorithm based on
ant colony
optimization has been
proposed
• The pheromone
update mechanism has
been proved as a
efficient and effective
tool to balance the load.
This modification
supports to minimize
the make span of the
cloud computing based
services.
• This technique does
not consider the fault
tolerance issues.
23
26. Conclusion
This load balancing technique based on Ant Colony Optimization gives
optimal resource utilization.
The performance of the system is enhanced with high availability of
resources, thereby increasing the throughput.
This increase in throughput is due to the optimal utilization of resources
Future work is to implement this technique with the consideration of
server’s CPU power, memory etc while redistributing load and also to do
implementation of algorithm for finding out neighbors of a node with
particular Data Center Network Architecture.
Future work
24
27. References:
Nitin and Ravi Rastogi, Kumar Nishant, Pratik Sharma, Vishal Krishna,Chhavi
Gupta and Kunwar Pratap Singh,Load Balancing of Nodes in Cloud Using Ant
Colony Optimization, IEEE 2012 14th International Conference on Modelling and
Simulation
Ekta Gupta , Vidya Deshpande . A Technique Based on Ant Colony Optimization for
Load Balancing in Cloud Data Center ,IEEE 14 13th International Conference on
Information Technology.
Shagufta khan and Niresh Sharma, Ant Colony Optimization for Effective Load
Balancing In Cloud Computing, ISSN 2278-6856 IJETTCS
Santanu Dam, Gopa Mandal,Kousik Dasgupta,and Paramartha Dutta.An Ant Colony
Based Load Balancing Strategy in Cloud Computing. Springer International
Publishing Switzerland 2014
Klaithem Al Nuaimi, Nader Mohamed, Mariam Al Nuaimi and Jameela Al-Jaroodi
.A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms.
2012 IEEE Second Symposium on Network Cloud Computing and Applications
Ratan Mishra and Anant Jaiswal Ant colony Optimization: A Solution of Load
balancing in Cloud. International Journal of Web & Semantic Technology (IJWesT)
Vol.3, No.2, April 2012.
https://en.wikipedia.org/wiki/Ant_colony_optimization_algorithms 25