This document summarizes a paper that presents a novel method for passive resource discovery in cluster grid environments. The method monitors network packet frequency from nodes' network interface cards to identify nodes with available CPU cycles (<70% utilization) by detecting latency signatures from frequent context switching. Experiments on a 50-node testbed showed the method can consistently and accurately discover available resources by analyzing existing network traffic, including traffic passed through a switch. The paper also proposes algorithms for distributed two-level resource discovery, replication and utilization to optimize resource allocation and access costs in distributed computing environments.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDSijcsit
A novel taxonomy of replica selection techniques is proposed. We studied some data grid approaches
where the selection strategies of data management is different. The aim of the study is to determine the
common concepts and observe their performance and to compare their performance with our strategy
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...IJCNCJournal
The bandwidth utilization plays a vital role in a Wireless Sensor Network (WSN) that transmits data packets from source peer to perspective destination peer without any packet loss and time delay. In a conventional system, two main features cannot be satisfied concurrently such as low delay and high data
reliability and then the peer was transferred fewer data packets and it optimized with regular bandwidth rate. Moreover, the convention of bandwidth in network routers influences the quality of service (QoS). To overcome the above issues, an Efficient Reliability and Interval Discrepant Routing (ERIDR) algorithm is proposed to optimize bandwidth utilization on the router network with the help of bandwidth optimizer. The
bandwidth optimizer allocates required bandwidth for data transmission to each peer simultaneously to ensure the bandwidth efficiency. The proposed design is to optimize bandwidth utilization of every peer and increase data processing via higher bandwidth rate that reduces time delay and minimizes energy consumption. The proposed method establishes a high bandwidth rate router to transmit data concurrently from source peer to destination peer (peer-to-peer) without any packet loss by initializing host IP address for every peer. Based on Experimental evaluations, proposed methodology reduces 3.32 AD (Average Delay), 0.05 ET (Execution Time), 5.44 EC (Energy Consumption) and 0.28 BU (Bandwidth Utilization)
compared than existing methodologies.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
The role of materialized views is becoming vital in today’s distributed Data warehouses. Materialization is
where parts of the data cube are pre-computed. Some of the real time distributed architectures are
maintaining materialization transparencies in the sense the users are not known with the materialization at
a node. Usually what all followed by them is a cache maintenance mechanism where the query results are
cached. When a query requesting materialization arrives at a distributed node it checks in its cache and if
the materialization is available answers the query. What if materialization is not available- the node
communicates the query in the network until a node answering the requested materialization is available.
This type of network communication increases the number of query forwarding’s between nodes. The aim
of this paper is to reduce the multiple redirects. In this paper we propose a new CB-pattern tree indexing to
identify the exact distributed node where the needed materialization is available.
Grid computing can involve lot of computational tasks which requires trustworthy computational nodes. Load balancing in grid computing is a technique which overall optimizes the whole process of assigning computational tasks to processing nodes. Grid computing is a form of distributed computing but different from conventional distributed computing in a manner that it tends to be heterogeneous, more loosely coupled and dispersed geographically. Optimization of this process must contains the overall maximization of resources utilization with balance load on each processing unit and also by decreasing the overall time or output. Evolutionary algorithms like genetic algorithms have studied so far for the implementation of load balancing across the grid networks. But problem with these genetic algorithm is that they are quite slow in cases where large number of tasks needs to be processed. In this paper we give a novel approach of parallel genetic algorithms for enhancing the overall performance and optimization of managing the whole process of load balancing across the grid nodes.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDSijcsit
A novel taxonomy of replica selection techniques is proposed. We studied some data grid approaches
where the selection strategies of data management is different. The aim of the study is to determine the
common concepts and observe their performance and to compare their performance with our strategy
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...IJCNCJournal
The bandwidth utilization plays a vital role in a Wireless Sensor Network (WSN) that transmits data packets from source peer to perspective destination peer without any packet loss and time delay. In a conventional system, two main features cannot be satisfied concurrently such as low delay and high data
reliability and then the peer was transferred fewer data packets and it optimized with regular bandwidth rate. Moreover, the convention of bandwidth in network routers influences the quality of service (QoS). To overcome the above issues, an Efficient Reliability and Interval Discrepant Routing (ERIDR) algorithm is proposed to optimize bandwidth utilization on the router network with the help of bandwidth optimizer. The
bandwidth optimizer allocates required bandwidth for data transmission to each peer simultaneously to ensure the bandwidth efficiency. The proposed design is to optimize bandwidth utilization of every peer and increase data processing via higher bandwidth rate that reduces time delay and minimizes energy consumption. The proposed method establishes a high bandwidth rate router to transmit data concurrently from source peer to destination peer (peer-to-peer) without any packet loss by initializing host IP address for every peer. Based on Experimental evaluations, proposed methodology reduces 3.32 AD (Average Delay), 0.05 ET (Execution Time), 5.44 EC (Energy Consumption) and 0.28 BU (Bandwidth Utilization)
compared than existing methodologies.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
The role of materialized views is becoming vital in today’s distributed Data warehouses. Materialization is
where parts of the data cube are pre-computed. Some of the real time distributed architectures are
maintaining materialization transparencies in the sense the users are not known with the materialization at
a node. Usually what all followed by them is a cache maintenance mechanism where the query results are
cached. When a query requesting materialization arrives at a distributed node it checks in its cache and if
the materialization is available answers the query. What if materialization is not available- the node
communicates the query in the network until a node answering the requested materialization is available.
This type of network communication increases the number of query forwarding’s between nodes. The aim
of this paper is to reduce the multiple redirects. In this paper we propose a new CB-pattern tree indexing to
identify the exact distributed node where the needed materialization is available.
Grid computing can involve lot of computational tasks which requires trustworthy computational nodes. Load balancing in grid computing is a technique which overall optimizes the whole process of assigning computational tasks to processing nodes. Grid computing is a form of distributed computing but different from conventional distributed computing in a manner that it tends to be heterogeneous, more loosely coupled and dispersed geographically. Optimization of this process must contains the overall maximization of resources utilization with balance load on each processing unit and also by decreasing the overall time or output. Evolutionary algorithms like genetic algorithms have studied so far for the implementation of load balancing across the grid networks. But problem with these genetic algorithm is that they are quite slow in cases where large number of tasks needs to be processed. In this paper we give a novel approach of parallel genetic algorithms for enhancing the overall performance and optimization of managing the whole process of load balancing across the grid nodes.
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...ijcsit
The wide usage of the Internet and the availability of powerful computers and high-speed networks as low cost
commodity components have a deep impact on the way we use computers today, in such a way that
these technologies facilitated the usage of multi-owner and geographically distributed resources to address
large-scale problems in many areas such as science, engineering, and commerce. The new paradigm of
Grid computing has evolved from these researches on these topics. Performance and utilization of the grid
depends on a complex and excessively dynamic procedure of optimally balancing the load among the
available nodes. In this paper, we suggest a novel two-dimensional figure of merit that depict the network
effects on load balance and fault tolerance estimation to improve the performance of the network
utilizations. The enhancement of fault tolerance is obtained by adaptively decrease replication time and
message cost. On the other hand, load balance is improved by adaptively decrease mean job response time.
Finally, analysis of Genetic Algorithm, Ant Colony Optimization, and Particle Swarm Optimization is
conducted with regards to their solutions, issues and improvements concerning load balancing in
computational grid. Consequently, a significant system utilization improvement was attained. Experimental
results eventually demonstrate that the proposed method's performance surpasses other methods.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...ijcseit
This paper mainly presents some technical discussions on the identification and analyze of “LAN usersessions”.
The identification of a user-session is non trivial. Classical methods approaches rely on
threshold based mechanisms. Threshold based techniques are very sensitive to the value chosen for the
threshold, which may be difficult to set correctly. Clustering techniques are used to define a novel
methodology to identify LAN user-sessions without requiring an a priori definition of threshold values. We
have defined a clustering based approach in detail, and also we discussed positive and negative of this
approach, and we apply it to real traffic traces. The proposed methodology is applied to artificially
generated traces to evaluate its benefits against traditional threshold based approaches. We also analyzed
the characteristics of user-sessions extracted by the clustering methodology from real traces and study
their statistical properties.
Data mining is the knowledge discovery in databases and the gaol is to extract patterns and knowledge from
large amounts of data. The important term in data mining is text mining. Text mining extracts the quality
information highly from text. Statistical pattern learning is used to high quality information. High –quality in
text mining defines the combinations of relevance, novelty and interestingness. Tasks in text mining are text
categorization, text clustering, entity extraction and sentiment analysis. Applications of natural language
processing and analytical methods are highly preferred to turn
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...ijcsa
Grid computing is one of the area which is having outstanding advancement nowadays. Grid computing
have emerged to harness distributed computing and network resources to provide powerful services. The
non-deterministic characteristic of the resource availability in these new computing platforms raises an
outstanding challenge. Since grid computing is rapidly growing in heterogeneous environment it is used for
utilizing and sharing large scale resources to solve complex problems. One of the most challenging task in
the area of grid is resource provisioning. As it is very well known that there are enormous amount of
resources present in the grid environment, it is very hard to schedule them. There are two types users
namely the local users and the external users. Resources has to be provided to both the users request.
When the user submits the job, the request has to be satisfied by providing the resources. Here the
resources are provided in the form of virtual machines (VM).The problem arises when there is insufficiency
of resources to provide both the users. The problem becomes more hectic when the external requests have
more QoS requirements. The local users can be provided with the resources by preempting the VMs from
the external requests which causes imposed overhead on the system. Now the idea is how to decrease the
preemption of VMs and how to utilize the resources efficiently. Here we propose a policy in Intergrid which
reduces the no of VM preemption and which will also distribute the external requests accordingly so that
preemption of valuable requests is reduces.
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
Wireless Sensor Networks (WSNs) based on the IEEE 802.15.4 MAC and PHY layer standards is a recent trend in the market. It has gained tremendous attention due to its low energy consumption characteristics and low data rates. However, for larger networks minimizing energy consumption is still an issue because of the dissemination of large overheads throughout the network. This consumption of energy can be reduced by incorporating a novel cooperative caching scheme to minimize overheads and to serve data with minimal latency and thereby reduce the energy consumption. This paper explores the possibilities to enhance the energy efficiency by incorporating a cooperative caching strategy.
Using Cisco Network Components to Improve NIDPS Performance csandit
Network Intrusion Detection and Prevention Systems (NIDPSs) are used to detect, prevent and
report evidence of attacks and malicious traffic. Our paper presents a study where we used open
source NIDPS software. We show that NIDPS detection performance can be weak in the face of
high-speed and high-load traffic in terms of missed alerts and missed logs. To counteract this
problem, we have proposed and evaluated a solution that utilizes QoS, queues and parallel
technologies in a multi-layer Cisco Catalyst Switch to increase NIDPSs detection performance.
Our approach designs a novel QoS architecture to organise and improve throughput-forwardplan
traffic in a layer 3 switch in order to improve NIDPS performance.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
ABSTRACT
Wireless sensor network is a set of tiny elements i.e. sensors. WSN is used in the field of Health Monitoring, Civil Construction, Military Applications and Agricultural etc., for monitoring environmental parameters.The WSN is having the challenges like less processing power, less memory, less bandwidth and battery
powered. The data monitored through the sensors would be sent to the sink for data processing. The data sent from sensor node can be controlled for saving the energy, as maximum energy is consumed for transmission of data and it is not possible to replace the batteries frequently. In this work threshold based and adaptive threshold based data reduction techniques with energy efficient shortest path are used for minimizing the energy of sensor node and the network. Adaptive approach saves energy and reduce data by 30% to 40% as compared to threshold based approach.
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...ijcsit
The wide usage of the Internet and the availability of powerful computers and high-speed networks as low cost
commodity components have a deep impact on the way we use computers today, in such a way that
these technologies facilitated the usage of multi-owner and geographically distributed resources to address
large-scale problems in many areas such as science, engineering, and commerce. The new paradigm of
Grid computing has evolved from these researches on these topics. Performance and utilization of the grid
depends on a complex and excessively dynamic procedure of optimally balancing the load among the
available nodes. In this paper, we suggest a novel two-dimensional figure of merit that depict the network
effects on load balance and fault tolerance estimation to improve the performance of the network
utilizations. The enhancement of fault tolerance is obtained by adaptively decrease replication time and
message cost. On the other hand, load balance is improved by adaptively decrease mean job response time.
Finally, analysis of Genetic Algorithm, Ant Colony Optimization, and Particle Swarm Optimization is
conducted with regards to their solutions, issues and improvements concerning load balancing in
computational grid. Consequently, a significant system utilization improvement was attained. Experimental
results eventually demonstrate that the proposed method's performance surpasses other methods.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IDENTIFICATION AND INVESTIGATION OF THE USER SESSION FOR LAN CONNECTIVITY VIA...ijcseit
This paper mainly presents some technical discussions on the identification and analyze of “LAN usersessions”.
The identification of a user-session is non trivial. Classical methods approaches rely on
threshold based mechanisms. Threshold based techniques are very sensitive to the value chosen for the
threshold, which may be difficult to set correctly. Clustering techniques are used to define a novel
methodology to identify LAN user-sessions without requiring an a priori definition of threshold values. We
have defined a clustering based approach in detail, and also we discussed positive and negative of this
approach, and we apply it to real traffic traces. The proposed methodology is applied to artificially
generated traces to evaluate its benefits against traditional threshold based approaches. We also analyzed
the characteristics of user-sessions extracted by the clustering methodology from real traces and study
their statistical properties.
Data mining is the knowledge discovery in databases and the gaol is to extract patterns and knowledge from
large amounts of data. The important term in data mining is text mining. Text mining extracts the quality
information highly from text. Statistical pattern learning is used to high quality information. High –quality in
text mining defines the combinations of relevance, novelty and interestingness. Tasks in text mining are text
categorization, text clustering, entity extraction and sentiment analysis. Applications of natural language
processing and analytical methods are highly preferred to turn
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...ijcsa
Grid computing is one of the area which is having outstanding advancement nowadays. Grid computing
have emerged to harness distributed computing and network resources to provide powerful services. The
non-deterministic characteristic of the resource availability in these new computing platforms raises an
outstanding challenge. Since grid computing is rapidly growing in heterogeneous environment it is used for
utilizing and sharing large scale resources to solve complex problems. One of the most challenging task in
the area of grid is resource provisioning. As it is very well known that there are enormous amount of
resources present in the grid environment, it is very hard to schedule them. There are two types users
namely the local users and the external users. Resources has to be provided to both the users request.
When the user submits the job, the request has to be satisfied by providing the resources. Here the
resources are provided in the form of virtual machines (VM).The problem arises when there is insufficiency
of resources to provide both the users. The problem becomes more hectic when the external requests have
more QoS requirements. The local users can be provided with the resources by preempting the VMs from
the external requests which causes imposed overhead on the system. Now the idea is how to decrease the
preemption of VMs and how to utilize the resources efficiently. Here we propose a policy in Intergrid which
reduces the no of VM preemption and which will also distribute the external requests accordingly so that
preemption of valuable requests is reduces.
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
Wireless Sensor Networks (WSNs) based on the IEEE 802.15.4 MAC and PHY layer standards is a recent trend in the market. It has gained tremendous attention due to its low energy consumption characteristics and low data rates. However, for larger networks minimizing energy consumption is still an issue because of the dissemination of large overheads throughout the network. This consumption of energy can be reduced by incorporating a novel cooperative caching scheme to minimize overheads and to serve data with minimal latency and thereby reduce the energy consumption. This paper explores the possibilities to enhance the energy efficiency by incorporating a cooperative caching strategy.
Using Cisco Network Components to Improve NIDPS Performance csandit
Network Intrusion Detection and Prevention Systems (NIDPSs) are used to detect, prevent and
report evidence of attacks and malicious traffic. Our paper presents a study where we used open
source NIDPS software. We show that NIDPS detection performance can be weak in the face of
high-speed and high-load traffic in terms of missed alerts and missed logs. To counteract this
problem, we have proposed and evaluated a solution that utilizes QoS, queues and parallel
technologies in a multi-layer Cisco Catalyst Switch to increase NIDPSs detection performance.
Our approach designs a novel QoS architecture to organise and improve throughput-forwardplan
traffic in a layer 3 switch in order to improve NIDPS performance.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKpijans
ABSTRACT
Wireless sensor network is a set of tiny elements i.e. sensors. WSN is used in the field of Health Monitoring, Civil Construction, Military Applications and Agricultural etc., for monitoring environmental parameters.The WSN is having the challenges like less processing power, less memory, less bandwidth and battery
powered. The data monitored through the sensors would be sent to the sink for data processing. The data sent from sensor node can be controlled for saving the energy, as maximum energy is consumed for transmission of data and it is not possible to replace the batteries frequently. In this work threshold based and adaptive threshold based data reduction techniques with energy efficient shortest path are used for minimizing the energy of sensor node and the network. Adaptive approach saves energy and reduce data by 30% to 40% as compared to threshold based approach.
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
In wireless sensor network (WSN) there are two main problems in employing conventional compression
techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression
ratio, but also depends on the computational and communication overheads. In Compressive Data
Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying
compression technique without losing any information of complete data. In our previous work, we have
developed an adaptive traffic aware aggregation technique in which the aggregation technique can be
changed into structured and structure-free adaptively, depending on the load status of the traffic. In this
paper, as an extension to our previous work, we provide a cost effective compressive data gathering
technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive
data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network
lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is a crucial
step in analysing structured data and in finding association relationship between items. This stands as an
elementary foundation to supervised learning, which encompasses classifier and feature extraction
methods. Applying this algorithm is crucial to understand the behaviour of structured data. Most of the
structured data in scientific domain are voluminous. Processing such kind of data requires state of the art
computing machines. Setting up such an infrastructure is expensive. Hence a distributed environment
such as a clustered setup is employed for tackling such scenarios. Apache Hadoop distribution is one of
the cluster frameworks in distributed environment that helps by distributing voluminous data across a
number of nodes in the framework. This paper focuses on map/reduce design and implementation of
Apriori algorithm for structured data analysis.
Abstract— Cloud storage is usually distributed infrastructure, where data is not stored in a single device but is spread to several storage nodes which are located in different areas. To ensure data availability some amount of redundancy has to be maintained. But introduction of data redundancy leads to additional costs such as extra storage space and communication bandwidth which required for restoring data blocks. In the existing system, the storage infrastructure is considered as homogeneous where all nodes in the system have same online availability which leads to efficiency losses. The proposed system considers that distributed storage system is heterogeneous where each node exhibit different online availability. Monte Carlo Sampling is used to measure the online availability of storage nodes. The parallel version of Particle Swarm Optimization is used to assign redundant data blocks according to their online availability. The optimal data assignment policy reduces the redundancy and their associated cost.
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies.
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ax34298305
1. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
298 | P a g e
Two Level Resource Discovery And Replication For Secure
Utilization In Distributed Computing Environments
V.Siva Kumar, Dr. G.Prakash Babu, Ph.D.
Dept of CSE, Intell Engineering College, JNTU, Anantapur, Andhra Pradesh, India-515001
Associate Professor, Dept of CSE, Intell Engineering College, JNTU, Anantapur, Andhra Pradesh, India-515001
Abstract
This paper presents the details of a novel
method for passive resource discovery in cluster
grid environments, where resources constantly
utilize inter node communication. This method
offers the ability to non-intrusively identify
resources that have available CPU cycles; this is
critical for lowering queue wait times in large
cluster grid networks. The benefits include: 1)
low message complexity, which facilitates low
latency in distributed networks, 2) scalability,
which provides support for very large networks,
and 3) low maintainability, since no additional
software is needed on compute resources. Using a
50-node (multicore) test bed (DETER lab), this
paper demonstrate the feasibility of the method
with experiments utilizing TCP, UDP, and ICMP
network traffic. I use a simple but powerful
technique that monitors the frequency of network
packets emitted from the Network Interface Card
(NIC) of local resources. I observed the
correlation between CPU load and the timely
response of network traffic. A highly utilized
CPU will have numerous, active processes which
require context switching. The latency associated
with numerous context switches manifests as a
delay signature within the packet transmission
process. This method detects that delay signature
to determine the utilization of network resources.
Results show that the method can consistently
and accurately identify nodes with available CPU
cycles (<70 percent CPU utilization) through
analysis of existing network traffic, including
network traffic that has passed through a switch
(non-congested). Also, institutions where there is
no existing network traffic for nodes, ICMP ping
replies can be used to ascertain this resource
information.
I. Introduction
With the advances in network technologies,
applications are all moving toward serving widely
distributed users. However, today’s Internet still
cannot guarantee quality of services and potential
congestions can result in prolonged delays and leave
unsatisfied customers. The problem can be more
severe when the accesses involve a large amount of
data. Replication techniques have been commonly
used to minimize the communication latency by
bringing the data close to the clients. Web caching is
a successful example of the technique. However,
when the data may be updated, the problem is more
complicated. The more models in the system, the
higher the update cost will be. Thus, data needs to be
carefully placed to avoid unnecessary overhead.
There have been a lot of research works
addressing the data model placement issues in
Computational Clusters [1, 4, 7, 14, 15]. Generally,
the access pattern is used to guide the placement
decision. Several considerations like static [1] and
dynamic [2, 7, 15] placement decisions and full and
partial replication schemes have also been
investigated. Partial replication take into
consideration reproduce subsets of resources and is
generally required for environments showing strong
access locality [8, 11]. Almost all the model
placement algorithms do not specifically presume
full or partial replication [5, 15]. In reality, most of
the placement decision algorithms can be applied to
both cases by managing the granularity of the
resources that are considered. But, each of these
algorithms presumes that resources are not
dependent on each other. In several applications,
each and every request/transaction may have access
to multiple resources and, so, bringing correlation
among the resources. Going by example, for a read
transaction accessing multiple resources, all of these
resources at a local site will be able to decline
communication overhead. But, in the case of only a
part of the data set that is being accessed is modeled
at a local site, then the replication will not bring
much advantage. This is because the read transaction
still requires to be forwarded in order to recover the
resources that are left out. The same is applied to an
update transaction that is accessing multiple
resources. In the case of only a part of the data set
that is being updated is modeled, a message is
required for sending the update request. So, for
getting better model allocation, it is necessary to
take into consideration the access correlation among
resources. In [12], we have dealt about the model
placement issues of correlated resources in mobile
environments considering mobile networks that are
having a star topology. Further, it presumes that
every time the base station node holds the total data
set (comprising all resources that may be required by
the mobile nodes). This is required for minimizing
the mobile unit connection time for the accesses.
2. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
299 | P a g e
Whenever the general Internet environment is taken
into consideration, several issues are to be
considered. The first one is that there is no need of
considering the connection time for Internet based
clients and partial replication is needed.
Moreover, a greater complex topology
requires consideration for Internet accesses. So, a
more sophisticated placement algorithm for
correlated resources should be evolved. A crucial
issue in model placement algorithms in such kind of
environment is that who executes the intensive
placement computation. Some of the placement
algorithms are centralized [6, 14] that makes the
central decision-making site to be overloaded
severely. Distributed model placement algorithms,
like [10, 15], grant each model site to make localized
decisions. They will be able to react to changes in
access patterns and naturally divide the computation.
In this paper, we construct a dynamic model
placement algorithm, which (1) takes into
consideration a tree topology network, (2) considers
the correlation among resources whenever accessed
by the same requests, and (3) gives distributed
algorithm that does localized analysis for declining
the computation cost. Moreover, our algorithm is
adaptive. It takes into consideration 2 schemes. To
get optimal solutions, a distributed branch and bound
algorithm is utilized to calculate the optimal set of
resources models to be designated on the
computational clusters. Remember that in
commercial applications, transaction access patterns
follow the “80/20” rule [3], i.e., just 20% of the
transaction types accounts for 80% of the total
amount of the transactions. Whenever the
transaction access pattern is stabled, the set of
resources associated is considerably small. Lanier
Watkins et al[] discussed a Passive Solution to the
Memory Resource Discovery Problem in
Computational Clusters. When compared to existing
models this solution is more robust secure and
scalable. The prime benefits of this model are low
message complexity, scalability, load balancing, and
low maintainability but limited their solution to deal
with resource requirements of the clusters.
So, the optimal algorithm is obtainable in
this case. For dealing with the access patterns that
are frequently changed, we suggest resource
discovery, replication and utilization algorithms for
getting near optimal solutions, which is motivated
from the work carried out by Lanier Watkins et al[].
The remaining part of this paper is distributed as
follows. Section 2 explains our system model and
problem definition, depending on the system model
that is defined in [12]. Section 3 delves about the
transaction based cost model in a distributed
environment. Section 4 gives a distributed partial
replication algorithm (ICRDU). Section 5 deals
about a intra cluster resource replication and
utilization partial replication algorithm (ICRRU).
Section 6 is about the experimental study results and
Section 7 concludes the paper.
II. Resource allocation System Format
Studies reveal that the networks can be
disintegrated into connected autonomous systems,
which are under separate administrative control [9].
These autonomous systems are generally treated as
clusters. By this way the underlying topology of the
widely distributed system as a cluster based general
graph is modeled by us. For scaling the system, we
presume that there is a data server in each and every
cluster. In this research, we take into consideration
only the data model placement on the computational
clusters, and the model assignment inside each
cluster can be treated separately. We presume that
the actual copy of the entire set of N resources that
are to be accessed by users is put up at a primary
data server that is indicated as O. Let OD indicate
the N resources on the data server O, then,
1 2{ , ,..., }O ND d d d and | OD | = N. Whenever
applications use data saved in this primary sever,
they generally follow a shortest path tree routing to
the data source that is positioned at the primary
server O [9]. Study reveals that almost all routings
are stable in days or weeks and so the routing paths
can be looked upon as a tree topology that is rooted
at the primary server O. So, we take into
consideration replication the widely distributed
system as a tree graph, indicated as T, rooted at the
primary server O. To expedite efficient data accesses
by users in the Internet, a subset of resources in OD
are modeled on computational clusters in T.
Let xD indicate the resources on a data
server x, then xD ⊆ OD , and | xD | is the number
of modeled resources in xD . Take a set of resources
Ω, let R(Ω) indicate the resident set of Ω that is the
set of computational clusters hold Ω or a superset of
Ω, i.e. R(Ω) = {x∈T | Ω ⊆ xD }.The divided system
bolsters both read and update requests and each
request can have access to an random number of
resources in OD . For each and every data server x
in T, there are a number of clients that are connected
to it. The requests that are given by these clients can
be seen as requests from the data server x.
Presuming that clients can give both read and update
requests. Let t indicate a transaction, it can be a read
transaction or an update transaction. Let D (t)
indicate the set of resources read or updated by t, D
(t) ⊆ OD , and D (t) is designated as a transaction-
data set of t. For a transaction t accessing D (t) given
by a data server v, if D (t) ⊆ VD , then t is served
3. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
300 | P a g e
locally. Contra wise, t is send to the closest data
server, which can serve t.
For an update transaction t, the data server
that performs t requires to send the update to other
computational clusters through the edges in a tree
that only possess of all those computational clusters
*x in T, where D (t) ∩ *xD ≠ φ. Our aim is to
optimally allocate the models resources in OD to
computational clusters in T in such a way that
aggregate access cost is minimized for a given client
access pattern. We define a model placement that is
having the minimal cost as an optimal model
placement of OD (OptPl ( OD )). Observe that
optimal placement solutions may not be unique.
Take a data set Ω, R (Ω) in an OptPl ( OD ) is an
optimal resident set of Ω. During this research, we
don’t take into consideration node capacity
constraint, message losses, node failures, and the
consistency maintenance issues. The communication
cost that is brought up by model placement and de-
allocation is also not taken into consideration.
III. Operation Based limited Replication
rate format
During this section, we make definition of
operation based limited replication rate formats for
correlated resources in a tree graph, depending on
the cost models that are defined in [Tum06a]. Take 2
computational clusters x and y, where data server y
is the parent data server of x. Here, we only
emphasize model allocation decisions at y and
model de-allocation decision at x. This is because
model allocation and de-allocation models and
approaches can be applied in a similar fashion to
other computational clusters in tree T. Take a set of
resources Ω, Ω ⊆ OD . If Ω is modeled to x, a read
transaction t, D (t) ⊆ Ω, can be served locally and
one message can be saved. We take into
consideration this as one unit of advantage for
modeling Ω on x. But, because of the replication of
Ω on x an update transaction t, D (t) ∩ Ω ≠ φ,
requires to be send to x. We regard this as one unit
of cost put up by modeling Ω on x.
We define update_a (Ω, x) as the cost if Ω is
modeled from x’s parent data server (y) to x, where
update_a(Ω, x) = Σ|W(S)|, where (S ∩ Ω ≠ φ) ∧ (S ∩
xD = φ)
We define read_a(Ω,x) as the additional
advantage if R is modeled to x, where
Read_a(Ω, x) = Σ|Q(S)|, where (S ⊆ Ω ∪
xD ) ∧ (S ∩ Ω ≠ φ)
Now, we define cost_a(Ω, x) as the data
object access cost for modeling Ω at x from y, where
cost_a(Ω, x) = update_a(Ω, x) – read_a(Ω, x)
Let
a
optS indicates the set which minimizes
cost_a(Ω, x),
i.e.
a
optS = arg min (cost_a(Ω, x)). The transaction
based partial replication models
a
optS to x if cost_a
(
a
optS , x) < 0.
In ICRDU, a node x can only de-allocate a
data set Ω if and only if x is the leaf node of R(Ω)
depending on the knowledge of the model on its
child nodes, and x has held the model of Ω for since
the end of last time period. We indicate xDd as the
data set on x in such a way that x is the leaf node of
R( xDd ) and x has held the model of xDd since
the end of last time period. A set of resources, Ω ⊆
Ddx, may require de-allocation from x if modeling
Ω is not going to benefit in terms of communication
cost. Let update_d(Ω, x) indicate the de-allocation
advantage for de-allocating Ω. In essence, the de-
allocation advantage of Ω comprises all update
transactions from y, accessing a subset of resources
in Ω. update_d(Ω, x) = Σ|W(S)|, where (S ⊆ Ω) ∧ (Ω
⊆ xDd ) ∧ (S ≠ φ)Let read_d(Ω, x) indicate the de-
allocation cost. In essence, the de-allocation cost of
Ω comprises all read transactions that are issued by
x, accessing a subset of xDd and some resources in
Ω. read_d(Ω, x) = Σ|Q(S)|, where (S ∩ Ω ≠ φ) ∧ (S
⊆ xD ) ∧ (Ω ⊆ xDd ). The model de-allocation
access cost_d(Ω, x), is the dissimilarity between read
cost and update advantage for de-allocating Ω from
x.cost_d(Ω, x) = read _d(Ω, x) – update_d(Ω, x)Let
d
optS indicate the set taht minimizes cost_d(Ω, x),
i.e.
d
optS = arg min(cost_d(Ω, x)). The transaction
based partial replication de-allocates
d
optS from x if
cost_d (
a
optS , x) < 0.
IV. ICRDU Algorithm
From [13], the model placement problem in
T can be resolved by designating models in each
subtree respectively, and the placement of models on
each data server in T can also be done independently
to its neighboring computational clusters in T.
Moreover, the set of resources on v, VD , is a subset
of wD , where w is the parent data server of v in T.
The model placement on v can be treated only
dependent on w and they are not dependent on other
computational clusters. By this way, the model
placement problem can be resolved by a distributed
optimal partial replication (ICRDU) algorithm
(including ICRDUA and ICRDUD, in Fig. 1). At the
end of time period,τi, parent data server y creates
4. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
301 | P a g e
model allocation decision for its child data server x
by utilizing ICRDUA, depending on its knowledge
of the models on its child data server x that is got
from the end of last time period i -1.At the time of
getting the models that are allocated by y, data
server x creates model de-allocation decision for
itself by utilizing ICRDUD. In ICRDUD, data server
x can only de-allocate a set of resources Ω from x
only if x is a leaf data server of R(Ω), and it has hold
the model of resources in Ω since the end of time
periodτi-1. Let
a
optS (y, x, i ) indicate the data set
calculated by ICRDUA by data server y for its child
x at the end of i . Let
d
optS (x, i ) indicate the
data set calculated by ICRDUD by data server x for
itself at the end of i . See that in for averting
replication oscillation, ICRDU need that model de-
allocation decision must be made for x after x has
obtained model from its parent data server y in the
same time period i . Moreover, in ICRDUA and
ICRDUD, we require calculating the lower bound
cost for each new transaction-data
union TranListIndexS S . One easy way to calculate
the lower bound cost is read_a ( superS , x) –
update_a (( TranListIndexS S ), x),
where
. 1
sup
TranList Length
er i TranListIndex iS S S
, and Si is the
data set accessed by TranList[i], TranListIndex ≤ i ≤
n.
Min Cost: cost_a(
a
oprS ( , , ), ),iy x x initialized to
;
Min Cost_d: cost_d(
a
oprS ( , , ), ),iy x x initialized
to ;
S: the contained set during the search, initialized to
;
Lower Bound Cost( newS )& Lower Bound
Cost_d( newS ):
Defined following the algorithm
Tran List: the set of distinct transactions that access
data;
Tran List Index: initialized to 0;
If(TranListIndex<TranList.Length){
TranListIndexS =TranList;
[TranlistInded].getDataObjectSet()
newS S ;TranListIndexS
If(LowerBoundCost( newS )<MinCost)
ICRRU-A( ,newS TransListIndex+1);}
ICRRU-A (S, TranListIndex+1);}
else if(cost a(S, x)<Min Cost) {
MinCost=cost a(S, x);
a
opt
S ( , , )iy x = S - ;McD }
if (TranListIndex<TranList.Length) {
TranListIndexS = TranList;
[TranListIndex].getDataObjectSet();
newS S ;TranListIndexS
If(LowerBoundCost_d( newS ) MinCost_d){
ICRRU-A ( ,newS TransListIndex+1);}
ICRRU-A (S, TranListIndex+1);}
Else if(cost_d(S,x) MinCost_d) {
MinCost_d=cost_d(S,x);
a
opt
S ( , )ix = S; }
Fig 1: ICRDU Algorithm
Theorem 1 Let L indicate the tree level.
ICRDU stabilizes and converges to optimal in 2L
time periods. Proof: The proof is removed because
of space limitation. Kindly refer [13] for the full
proof.
V. ICRRU Algorithm
ICRRU since the run time of OPR
algorithms develops exponentially with the number
of transactions; we construct a intra cluster resource
replication and utilization replication algorithms
ICRRU, in which the heuristic Expansion-Shrinking
algorithms (discussed in [12]) is utilized.
,a
heuS *
a
heuS **
a
heuS .S: data sets and initialized to
;
* * YL ; a record log vector and initialized to ;
Make a copy of YL for cost computing;
While* YL
for all data set recorded in * YL choose the
data set S such that
a
heuS S is minimal:
if ( ** )a
heuS S delete the record with S
from* YL .
else if cost a(S, x) < 0 && ** a
heuS S
then ;a a
heu heuS S S
else if (cost a(S, x) >= 0
&& ) ( )a a
heu heuS S S S
then Sa
htU = S";w S;
else if ( cost_a(S, x) >= 0 && S n = (S c
then
a
heuS remains unchanged;
if the size of
a
heuS has been increased,
then delete the record with S from * YL , and
5. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
302 | P a g e
move all records from** YL to* YL .
Else move the record with S from * YL to ** YL .
*
a
heuS =
a
heuS ;
move all records from** YL to * YL , and
a
heuS ;
Assume that*
a
heuS has been allocated
to (* * )a
x x heuD D S , and re-do log reduction
in* YL .
while* YL
for all data set recorded in* YL
choose the data set S with
a
heuS S is minimal;
if cost_a( * ) cos _ ( * )a a
y x heu y x heuD D S S x t a D D S S x
;a a
heu heuS S S
if the size of has been increased,
then delete the record with S from* YL
and move all records from* YL to* YL .
else move the record with S from* YL to** YL .
** * ;a a
heu y x heuS D D S
If (cost(**
a
heuS , x)<0) **
a
heuS = ; ;
a
heuS =**
a
heuS * :a
heuS
Fig 2: ICRRU algorithm for Model
allotment(ICRRU-A)
The heuristic Expansion-Shrinking
algorithms now utilize the cost functions that are
defined in Section 3. Moreover, in order to make
ICRRU stabilize, we combine the Set-Expansion and
Set-Shrinking algorithms. In both algorithms, the
data server first performs the Set-Expansion
algorithm and calculates a data set, which is a subset
of the optimal data set that is calculated by the
optimal algorithms. Now, it performs the Set-
Shrinking algorithm presuming that the data set
calculated by the Set-Expansion algorithm is already
designated to the child data server or de-allocated
from itself. Finally, we merge the data sets
calculated by the two algorithms as the final data set
to be designated from y to x or de-allocated from x.
The model allotment process of ICRRU algorithm
(ICRRU-A) and the model withhold for ICRRU
algorithm (ICRRU-W) are indicated in Fig. 2 and 3,
respectively. ICRRU is defined as given below. At
the end of time period, τi, parent data server y
creates model allocation decision for its child data
server x by performing ESRA, depending on its
knowledge of the models on its child data server x
got from the end of last time period 1i . After
getting the models from y, data server x performs
ESRD and makes model de-allocation decision for
itself. At this point, data server x can only de-
allocate a set of resources Ω from x only if x is a leaf
data server of R(Ω), and it has held the model of
resources in Ω since the end of time period 1i .
Observe that for averting replication oscillation,
ICRRU needs that model de-allocation decision
must be made for x after x has obtained model from
its parent data server y during same time period i .
Theorem 2 Let L indicates the tree level. ICRRU
stabilizes in at most 2L time periods.
Proof: The proof is removed because of space
confinement. Kindly refer [13] for the full proof.
.d
heuS * ,d
heuS ** .d
heuS S: data sets and initialized to
; ** xL temporary record log vector and
initialized to ;
Make a copy of Lx for cost computing:
while (* )xL
for all data set recorded in* xL choose
the data set S such that
d
heuS S is minimal;
if ( ** )d
heuS S delete the record with S
from* xL
else if cost_d ( , ) 0&& d
heuS x S S
then ;d d
heu heuS S S
else if (COST d ( , ) cos _ ( , )d d
heu heuS S x t a S x
then ;d d
heu heuS S S
else if (
cost_d ( , ) 0&& ) ( )d d
heu heuS x S S S S
then
d
heuS remains unchanged,
if the size of has been increased
then delete the record with S from* xL and
move all records from** xL to* xL
else move the record with S
from* xL to** xL
* ;d d
heu heuS S
move all records from** xL to* xL and =
;d
heuS
Assume* d
heuS has been de-allocated from x
(* * )d
x x heuD D S and re-do log reduction
in** xL
while* xL
for all data set recorded in* BCL ,
6. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
303 | P a g e
choose the data set S with
d
heuS S minimal:
if
cost_d (* , ) cos _ (* , )d d
x heu x heuD S S x t d D S x
;d d
heu heuS S S
If the size of
d
heuS has been increased, then
delete the record with S from* xL
and move all records from** xL to* xL
else move the record with S
from* xL to** xL .
** * ;d d
heu x heuS D S
If(cost_d( (** , ) 0)** ;d d
heu heuS x S
** ;d d d
heu heu heuS S S
Fig 3: ICRRU algorithm for model withhold
(ICRRU-W)
VI. Simulation Results
In the simulation, comparison of the
ICRRU algorithm with the commonly utilized
distributed frequency-based partial replication
(DFPR) scheme is done for studying its performance
and effectiveness on message saving. Observe that
the frequency based algorithm defined in [12] can
easily be acclimatized to the distributed solution,
DFPR that is fairly direct that each and every node
makes local decision depending on the access
frequency. The tree network that we chose
comprises 20 nodes with height of 6. Initially, the
root node O (that indicates cluster HMSC) hosts all
the resources in data set OD . Each and every node x
in the tree is haphazardly allocated a partial set of
the resources xD ⊆ OD . The requirement is that
xD ⊆ yD if y is an ancestor of node x in the tree
network. The metric that we take into consideration
is the product of the number of messages and the
numbers of hops these messages are send in order to
process the requests in the tree network. Going by
example, if a request that is issued locally can be
served locally, then the number of message is
counted as 0. In the case of the request being served
at its parent, then one message is taken into count.
In this simulation, we utilize one PC
platform for simulating 20 server clusters and the
period of execution for each and every experiment
spans 10 time periods. The simulated distributed
algorithm requires retaining the history logs for
every request (most of the information is not
required in a real system). Because of the excessive
I/O, the simulation process becomes very time-
consuming (observe that the time is not because of
the algorithm itself). Helping to avert prejudiced
access patterns, multiple access patterns are
produced haphazardly and the data collection
process is redone for each and every pattern. In order
to balance between the confidence level of the
experimental results and the time for the simulation
study, we select repeating the procedure 100 times
(i.e., producing 100 distinct access patterns).
Whenever the number of resources and the number
of transactions increase, the system is likely to
overload and we have to further decline the
repetition to 10 times (i.e., utilizing only 10 distinct
access patterns). The final data given in the
following subsections are the average of these trials.
6.1 Transaction Generation
We presume that the resources accessed by
most of the transactions follow various patterns.
Moreover, because of access locality, we presume
that the patterns will be stable for some time periods.
In this experimental study, we first produce a series
of transactions and scrutinize the resources they
access. The set of resources accessed by a
transaction is defined as a resource bundle. We
produce transactions till M distinct resource bundles
are identified. Observe that the resource bundles
may have overlapping resources but no two resource
bundles are identically same. For producing a
transaction, the number of resources to be accessed
by the transaction, indicated as μ, is first ascertained.
μ is surrounded by TS and follows a Zipf
distribution. More specially, the chance of a
transaction having data set size μ is proportional to
1/ SZ
,
where SZ is the skew parameter of the Zipf
distribution [13]. Now, the μ resources are
ascertained. Let NS indicate the total number of
resources we have taken into consideration in the
experimental study.
Each and every data object is ranked. The
chance that a data object is accessed by a transaction
is proportional to1/ DZ
r (also a Zipf distribution),
where DZ is the skew parameter. Lastly, if a
transaction is read only or update is ascertained by
the ratio, R/W, in a uniform distribution. Here R is
the total number of read transactions given by MCP
and W is the aggregate number of update
transactions given by nodes other than MCP . From
the first batch of transactions produced, we get M
resource bundles and utilize them as the basis in
order to formulate an access distribution. The M
resource bundles are separated into 2 clusters,
comprising the read cluster having 1M resource
bundles for the read transactions and the write
cluster having 2M resource bundles for the update
transactions, where 1M + 2M = M and 1M / 2M
7. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
304 | P a g e
= R/W. For each and every cluster, 0.5 1M (or
0.5 2M ) virtual resource bundles are appended and
the pre-generated 1M (or 2M ) resource bundles
along with the virtual resource bundles are ranked.
The transactions are produced in the similar way as
talked about in [12]. Regarding simulation, we
presume that in a time limit T, NT transactions are
given from each data server in the tree.
In this manner, in each time period, all
computational clusters issue NT transactions that are
haphazardly produced depending on the same access
pattern. For making the model allocation decision
for a child data server, each and every data server
records the number of read transactions that are sent
from the child data server and the number of update
transactions received to the child data server. In a
similar fashion recording is also done in order to
make the model de-allocation decision for a child
data server. In case of a read transaction being issued
locally or sent from its children can be served
locally, then the transaction is recorded by the data
server records in its local log. Apart from that it also
records the update transactions spread from its
parent in the local transaction log. After the time
period, a model allocation decision is done for each
and every child data server depending on the
transaction log that is recorded for that child data
server and resources are reproduced and assigned to
the child data server if required. Now, All
computational clusters make the de-allocation
decision depending on its local transaction log.
Performance data are calculated depending on the
allocated transactions and the model set at each data
server in each time period, just before it gets another
model set from its parent. Observe that in this
simulation, the number of resources selected is small
as the amount of memory needed for recording logs
for each data server in each time period. A much
larger number of resources can be selected in case
the ICRRU is operated in a real system, as indicated
in [12].
6.2 The Stabilization
Comparison of the intra cluster resource
replication and utilization algorithm with the
distributed frequency-based algorithm is done for
observing the stability of the two algorithms. Fig. 4
gives the number of message necessary for
processing every transaction that is issued in the
system for the 2 algorithms. The number of
messages needed in the system drops very speedily
in the first 4 time periods for both algorithms. The
percentage of the number of messages declined at
the 1st time period is much greater compared to that
of the 2nd time period, which is instead greater than
that of the 3rd time period, so on and so forth. After
the completion 4th time period, the number of
messages that are required in the system remains
stable for both algorithms, less than 40% messages
are required. At any time period, the ICRRU
requires less number of messages than the ICRDU
algorithm but the difference is negligible.
Fig 4: The performance of the cost stabilization by
ICRDU and ICRRU
6.3 Scalability in terms of Resources and
Transactions proportionality
Comparison of the intra cluster resource
replication and utilization algorithm ICRRU with the
distributed frequency-based algorithm DFPR is done
and calculate the effect of NS (the number of
resources in OD ) on their performance. The
parameters in this experiment are set as given here:
DZ = 0.2, SZ = 0.5, R/W = 0.9, ST = 3, NT = 50
* SN . M and NS changes from 10 to 100 (M is
adjusted in order to make sure that we have access to
almost all resources). Fig. 5 indicates the number of
messages necessary for processing all the
transactions given by the system for the two
algorithms. If SN increases, the number of
messages necessary for the two algorithms increases
as the number of transaction also increases. But, the
difference of the message necessary for the 2
algorithms will be remained in a stable way (the
number of message necessary for resource discovery
and replication with ICRRU&ICRDU is 17% of that
needed for only resource discovery[16]), even
though the variation in the number of messages
increases.
Fig 5: Scalability of resource discovery and
usage[16] and ICRRU&ICRDU
8. V.Siva Kumar, Dr. G.Prakash Babu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.299-305
305 | P a g e
VII. Summary
In this paper, we scrutinize the dynamic
designation of correlated resources in computational
clusters. We model the topology of the network that
is formed by the computational clusters in the
distributed system as a tree. Initially we show that
model designation decisions can be done locally for
each and every model site in a tree network, using
data access knowledge of its neighbors. Now, we
develop a new replication cost model for correlated
resources in Internet environment. Depending on the
cost model and the algorithms that are used in
previous research, we have put in effort to develop a
inter cluster resource discovery and utilization
algorithm (ICRDU) for correlated data in internet
environment. ICRDU has 2 sub algorithms,
ICRDUA and ICRDUD, and it is indicated that
ICRDU stabilizes and converges in 2L time periods.
Here, L is the height of the tree.
Now, an intra cluster resource replication
and utilization algorithm (ICRRU) is now developed
for making model placement decisions in an
efficient manner. The ICRRU has 2 sub algorithms,
namely, ICRRU for model allotment and ICRRU for
model withhold, and it is indicated that ICRRU
stabilize in 2L time periods. The algorithm gets near
optimal solutions for the correlated data model and
produces significant performance gains. The
simulation results indicate that the intra cluster
resource replication and utilization allocation
algorithm outperforms the general resource
discovery and utilization schemes in a significant
way.
Reference
[1] P. Apers. Data allocation in distributed
database systems. ACM Transactions on
Database Systems Vol. 13, No. 3
(Sept.).1988.
[2] A. Bestavros and C. Cunha. Server-initiated
document dissemination for the WWW.
IEEE Data Engeneering Bulletin 19, 3
(Sept.), 3–11. 1996.
[3] S. Ceri, S. B. Navathe, and G. Wiederhold.
Distribution design of logical database
schemas. IEEE Transactions on Software
Engineering, Vol. SE-9, No. 4. 1983.
[4] D. Dowdy and D. Foster. Comparative
models of the file assignment problem.
Computing Surveys, 14(2), 1982.
[5] Y. Huang, P. Sistla, and O. Wolfson. Data
replication for mobile computers. In
Proceeding of 1994 ACM SIGMOD, May
1994.
[6] K. Kalpakis, K. Dasgupta, and O. Wolfson.
Optimal placement of models in trees with
read, write, and storage costs. IEEE
Transactions on Parallel and Computational
Clusters. Vol 12, No. 6. 2001.
[7] D. Kossmann. The state of the art in
distributed query processing. ACM
Computing Surveys (CSUR). Volume 32,
Issue 4. December 2000.
[8] Z. Lu and K. S. McKinley. Partial
collection replication versus cache for
information retrieval systems. In
Proceedings of the ACM International
Conference on Research and Development
in Information Retrieval, Athens, Greece,
July 2000.
[9] V. Paxson, End-to-End Routing Behavior
in the Internet, IEEE/ACM Transactions
Networking, 5(5) (1997) 601-615.
[10] J. Sidell, P. Aoki, A. Sah, C. Staelin, M.
Stonebrakeer, and A. Yu. Data replication
in Mariposa. In Proceedings IEEE
Conference on Data Engineering (New
Orleans, LA, Feb.), 485–494. 1996.
[11] A. Sousa, F Pedone, R Oliveira, and F
Moura. Partial replication in the database
state machine. In Proceedings of the IEEE
International Symposium on Network
computing and Applications. 2001.
[12] M. Tu, P. Li, L. Xiao I. Yen, and F.
Bastani. Model placement algorithms for
mobile transaction systems. IEEE
Transactions on Knowledge and Data
Engineering. Vol. 18, No. 7. 2006.
[13] M. Tu. A data management framework for
secure and dependable data grid.
Ph.DDissertation, UT Dallas.
http://www.utdallas.edu/~tumh2000/ref/Th
esis-Tu.pdf. July 2006.
[14] O. Wolfson and A. Milo. The multicast
policy and its relationship to modeled data
placement. ACM Trans. Database Systems.
Vol.16, No.1. 1991
[15] O. Wolfson, S. Jajodia and Y. Huang. An
adaptive data replication algorithm. ACM
Transactions on database systems. Vol22.
No.2 pages 255-314. 1997.
[16] Lanier Watkins, William H. Robinson,
Raheem A. Beyah: A Passive Solution to
the Memory Resource Discovery Problem
in Computational Clusters. IEEE
Transactions on Network and Service
Management 7(4): 218-230 (2010)