SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
DOI: 10.5121/ijcsit.2021.13403 25
CLOAK-REDUCE LOAD BALANCING STRATEGY
FOR MAPREDUCE
Mamadou Diarra and Telesphore Tiendrebeogo
Department of Mathematics and Computer Science, Nazi Boni University, Bobo-
Dioulasso, Burkina Faso
ABSTRACT
The advent of Big Data has seen the emergence of new processing and storage challenges. These
challenges are often solved by distributed processing.
Distributed systems are inherently dynamic and unstable, so it is realistic to expect that some resources
will fail during use. Load balancing and task scheduling is an important step in determining the
performance of parallel applications. Hence the need to design load balancing algorithms adapted to grid
computing.
In this paper, we propose a dynamic and hierarchical load balancing strategy at two levels: Intra-
scheduler load balancing, in order to avoid the use of the large-scale communication network, and inter-
scheduler load balancing, for a load regulation of our whole system. The strategy allows improving the
average response time of CLOAK-Reduce application tasks with minimal communication.
We ļ¬rst focus on the three performance indicators, namely response time, process latency and running
time of MapReduce tasks.
KEYWORDS
Big Data, Distributed processing, Load balancing, CLOAK-Reduce, Task allocation
1. INTRODUCTION
Information's increasing due to connected objects has seen the emergence of new technology
domains oļ¬€ering an alternative to traditional databases. Distributed systems oļ¬€er solutions for
high scalability of the information system through service-oriented architectures.
Big Data processing can be considered in two main phases: storing the data on a Distributed File
System (DFS) and running distributed computations on the data. Different approaches to
distributed computing have been proposed for Big Data processing, the most widely used being
MapReduce [1].
However, the implementation of distributed systems generates diļ¬ƒculties such as managing node
heterogeneity, task governance, degraded mode operation and load balancing.
However, load balancing, which consists in allocating data initially and then eventually
redistributing it over a set of processors in order to minimise their processing time, remains a real
problem for distributed systems.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
26
Our objective is to propose a load balancing and task allocation strategy for our distributed
CLOAK-Reduce model inspired by the CLOAK DHT [2], [3], [4] and MapReduce [1], [6], [7].
We will then evaluate the performance of this strategy simulations.
Our study focuses on the following aspects:
1. Our ļ¬rst contribution is the description of the load balancing strategy of CLOAK-Reduce.
2. Our second contribution is to study the quality of the results produced by the analysis of the
proposed load balancing strategy.
Our paper will be organized as follows:
1. A ļ¬rst step, we discuss the relative work;
2. A second step, we describe our model of the distributed processing platform;
3. The third part, we analyse the results of the diļ¬€erent simulations.
2. RELATED WORKS
2.1. Distributed Systems
A distributed system is a heterogeneous set of independent computers that appears to its users as
a single coherent system [8].
A distributed system (Figure 1) is an arbitrary set of computing units (Nodes) with its own
address space, linked in a network so that they can exchange messages and coordinate their
activities. A distributed system is capable of handling any number of processes.
Communication between the diļ¬€erent nodes is done by messages. It is important, to consider the
communication delay between the diļ¬€erent nodes [9].
Figure 1. Distributed systems computing environment
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
27
2.2. Grid Computing
Grid computing is a virtual infrastructure made up of a set of potentially shared, heterogeneous,
distributed, autonomous and delocalised computing resources [10].
Grid computing is an autonomous, dynamically reconļ¬gurable, scalable computing infrastructure
aggregating a large number of computing and data storage resources. It is intended to make
resources available to users of distributed computing.
More concretely, a computing grid is made up of a large number of heterogeneous and often
delocalized machines linked by an Internet network and made homogeneous to users by
middleware [11].
2.3. Distributed Hash Tables
DHT is a technology for constructing a hash table in a distributed system where each piece of
data is associated with a key and is distributed over the network. DHTs provide a consistent hash
function and eļ¬ƒcient algorithms for storing STORE (key, value) and locating LOOKUP (key) of
the node responsible for a given (key, value) pair.
It is therefore important to specify that only a reference of the declared object (Object IDentiļ¬er
(OID)) is stored in the DHT. Concerning the search for an object, only by routing the searched
key can the set of associated values be found [2], [3], [5].
In practice, DHTs are substituted by "overlay" networks on top of the physical networks, thus
reducing the size of the table at each node while considerably increasing the eļ¬ƒciency of the
search algorithm.
DHTs have been widely studied because of their attractive properties: eļ¬ƒciency and simplicity
with Chord [12], controlled data placement with SkipNet [13], Pastry [14] routing and
localization, and better consistency and reliable performance with Kademlia [15].
CLOAK DHT, the basis of our work, is based on a hyperbolic tree constructed in hyperbolic
space (hyperboloid) and stereographically projected into a PoincarƩ disk (Euclidean plane) of
radius 1 centred at the origin where the tree node uses a virtual coordinate system.
2.4. Load balancing
A node load is driven by the activity of the processes running locally. Load balancing is the
process of distributing network traļ¬ƒc across multiple servers. This ensures no single server bears
too much demand. By spreading the work evenly, load balancing improves application
responsiveness. It also increases the availability of applications and websites for users [16], [17].
The main goals of load balancing, in a distributed environment, are improving system
performance, maintaining stability in the system, building a system which is tolerant to faults and
to be able to make modiļ¬cations in the future.
However, the load balancing problem has two objectives, to consider [18], [19], [20]: minimising
user response time and reducing load imbalance between servers.
There are actually two types of load balancing algorithms:
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
28
ā€¢ Dynamic load balancing [21]: In a dynamic algorithm, the least loaded server in the whole
system is looking for and preference is given to it to load balancing. Dynamic load
balancing offers better performance;
Static load balancing [22], [23]: This algorithm needs to have prior information about the system
resources in order to be able to make sure that decision of load shifting does not depend on the
current system state. Static algorithm is suitable for systems with low load variation.
In this paper, we mainly interested in dynamic load balancing which oļ¬€ers us three architectures:
centralized, decentralized and hierarchical load balancing algorithms [24].
A dynamic process allocation algorithm consists of two basic elements: an information element
and a control element (Figure 2). The role of the information element is to maintain information
about the state of the distributed system, which is used by the control element to perform the
actual placement of processes [25].
Figure 2. Structure of a dynamic allocation algorithm
2.5. Data Replication
The objective of data replication is to increase data availability, reduce data access costs and
provide greater fault tolerance [26].
By replicating datasets to an oļ¬€-site location, organisations can more easily recover data after
catastrophic events, such as outages, natural disasters, human errors or cyberattacks.
3. OUR CONTRIBUTIONS
3.1. Cloak-Reduce
CLOAK-Reduce is built by implementing, on the CLOAK DHT, a module to create and execute
MapReduce operations. It is a distributed model that exploits the advantages of CLOAK DHT
and MapReduce. CLOAK DHT to submit Map () and Reduce () jobs in a balanced way thanks to
the replication mechanisms it oļ¬€ers in addition to the task scheduling strategy we provide (Figure
4)
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
29
The tree structure of the CLOAK DHT allowed us to deļ¬ne a hierarchical architecture of load
balancing at two levels: Intra-scheduler for local load balancing and Inter-schedulers for global
load balancing (Figure 3).
Our model consists of a root node, three schedulers, several candidate nodes or JobManagers
candidates and builder nodes or JobBuilders.
Figure 3. CLOAK-Reduce Architecture
3.1.1. Summary of the Invention
Root node: The root is a node of coordinate (0,0), the minimal depth (D0) tree, of the PoincarƩ
disk. It allows to:
ā€¢ Keep tasks that cannot be executed immediately in the root task spool;
ā€¢ Maintain schedulers load information;
ā€¢ Decide to submit a task to a scheduler.
Schedulers: The schedulers of depth (D1), have the function of:
ā€¢ Maintain the load information of all their JobManagers;
ā€¢ Decide global balancing of their JobManagers;
ā€¢ Synchronise their load information with their replicas to manage their failure and the others
schedulers for load balancing.
JobManagers: JobManagers candidates have a minimum depth (ā‰„ D2). They are elected for:
ā€¢ Supervise MapReduce jobs running;
ā€¢ Manage the load information related to JobBuilders;
ā€¢ Maintain their load state;
ā€¢ Decide local load balacing with their circulars replicas JobManager candidate of the same
scheduler;
ā€¢ Inform JobBuilders of the load balancing decided for the backup of intermediate
jobs.
JobBuilders: The JobBuilders are of minimum depth (ā‰„ D3). Their function is to:
ā€¢ Execute MapReduce jobs;
ā€¢ Synchronize the images of their diļ¬€erent works as they go on their radial replicas
ā€¢ of the depth > D3.
ā€¢ Keep the information on the state of their charge up to date;
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
30
ā€¢ Update this workload information at the JobManager;
ā€¢ Perform the balancing necessities ordered by their JobManagers.
Figure 4. CLOAK-Reduce function diagram
3.1.2. Load Balancing Strategy
Our work consists of load balancing at the JobManager level in a decentralised way, since the
JobManagers are independent of each other, which saves response time on the one hand, and
allows the selection of the circular replica that best matches the received task on the other.
The Scheduler allows local overloaded and underloaded JobManagers to be brought into contact
with each other so that they can work together to migrate tasks from one JobManager to the
other.
3.1.2.1. Brief Description
ā€¢ Each JobManager has a period, during which it sends its load information to the
JobManagers candidates of the same scheduler.
ā€¢ Each JobManager has a period, during which it sends its load information to its scheduler.
ā€¢ Each scheduler has a period, during which it sends its load information to the other
schedulers.
ā€¢ Each scheduler has a period, during which it sends its load information to the root.
ā€¢ Intra-scheduler load balancing is triggered by schedulers or their JobManagers.
ā€¢ Intra-scheduler load balancing of JobManager is performed between the JobManagers and
its JobManagers candidates to avoid the use of any scheduler communication network.
ā€¢ Schedulerā€™s intra-scheduler load balancing favours, where possible, load balancing
between JobManagers to avoid the use of any Scheduler communication network.
ā€¢ The overloaded scheduler redirects the task to be submitted to the root spool.
ā€¢ Inter-scheduler load balancing is triggered by the overloaded schedulers in case intra-
scheduler load balancing is not successful.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
31
ā€¢ Inter-scheduler load balancing favours load balancing between schedulers.
ā€¢ The root submits pending tasks to schedulers based on a load level.
3.1.2.2. Intra-Scheduler Load Balancing
Figure 5, Every JobManager can trigger a load balancing operation based on the current load it is
managing. This load is estimated from the various load information sent periodically by the
JobBuilders. The information received by JobManager allows it to distribute its load to its
candidate JobManagers. When the JobManager load balancing operation fails, the scheduler takes
over.
The scheduler tries, as a priority, to balance the load of the JobManager locally by distributing it
among the JobManagers that are under its control. This locality approach aims to reduce
communication costs, by avoiding inter-scheduler communications.
Figure 5. Intra-scheduler load balancing
3.1.2.3. Inter-Scheduler Load Balancing
Figure 6, Inter-scheduler load balancing is triggered only when intra-scheduler balancing fails
due to either JobManager saturation or insuļ¬ƒcient load supply from candidate JobManagers
compared to the demand from overloaded JobManagers. In this case, the overloaded scheduler
transfers the new submissions to the root.
Also, the root, according to the scheduler information, can ask the overloaded scheduler to
perform an inter-scheduler load balancing, considering the allocation costs and the choice of the
tasks to be selected.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
32
Figure 6. Inter-schedulers load balancing
3.1.3. Brief Description of Some Load Balancing Algorithms
We focus on the mean response time, the mean process latency, and the mean
running time of a task as a JobManager load.
Notations:
ā€¢ Break-even point for JobManagers:
ļƒ¼ Ī±j: Response time,
ļƒ¼ Ī²j: Process latency,
ļƒ¼ Ē«j: Running time for jobs.
ā€¢ Break-even point for Scedulers:
ļƒ¼ Ī±s: Response time,
ļƒ¼ Ī²s: Process latency,
ļƒ¼ Ē«s: Running time for jobs.
ā€¢ Nodes:
ā€¢ Jb: JobBuilder,
ā€¢ Jm : JobManager,
ā€¢ Jmc: JobManager candidate,
ā€¢ S: Scheduler,
ā€¢ R: Root
ā€¢ Variables:
ā€¢ Ļ„r : Jb response time ,
ā€¢ Ļ„a : Jb process latency ,
ā€¢ Ļ„e : Jb running time,
ā€¢ Ī¦r : Jm response time,
ā€¢ Ī¦a :Jm process latency,
ā€¢ Ī¦e : Jm running time
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
33
Figure 7. Some Algorithms
3.2. Performance Analysis
3.2.1. Experimental setup
For data collection, the circular and radial replication mechanisms of CLOAK-Reduce have been
set to ļ¬ve (05), in a dynamic network with 10% churns, have been required.
In order to study the scalability of the system in addition to load balancing, we opted to consider
a random number of nodes as follows: 100, 300, 500 and 1000, with the number of tasks varying
from 6000 to 10000 in steps of 1000.
The data processed in the rest of this paper are the result of ten (10) independent recurrence of
each simulation phase in order to extract a signiļ¬cant mean.
This collection allowed us to conduct a comparative study on the Intra-Scheduler and Inter-
Schedulers load balancing strategy.
This limitation is due to the hardware constraints of the machine to run the simulation.
All experiments were performed on a 2.60 GHz Intel Core i5 CPU PC with 8 GB memory
running Windows 10 Professional.
To achieve our simulation objectives, we opted to use the PeerSim simulator.
3.2.2. Simulator
ā€¢ PeerSim [27] is a simulator whose main objective is to provide high scalability, with
network sizes up to 1000000 nodes, which characterises its dynamics and extensibility. Its
modularity facilitates the coding of new applications. The PeerSim conļ¬guration ļ¬le has
three types of components: protocols, dynamics and observers.
ā€¢ Simulation [27] is a widely used method for performance evaluation. It consists of
observing the behaviour of a simpliļ¬ed model of the real system with the help of an
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
34
appropriate simulation program which will result in graphs that are easy to analyse and
interpret. This method is closer to the real model than analytical methods, and is used when
evaluation of direct measure becomes very expensive.
3.2.3. Some Performance Indicators
We are interested in reducing the response time, the process latency for jobs, and the running
time of MapReduce tasks. The following performance metrics have been analysed in order to
measure the performance.
ā€¢ Mean Response Time: This is the time spent in the queue of ready processes before the ļ¬rst
execution. To calculate the mean response time (MRT) of the processes we use the
following formula: With Ļ„ri= completion time - arrival date
ā€¢ Mean Process Latency: This is the mean time a process spends waiting. The mean process
latency (MPL) is calculated as follows With Ļ„ai= Ļ„ri - running time
ā€¢ Running Time: or Restitution time is the time that elapses between the submission of the
job and its completion.
ā€¢ Variance: The variance of a series, noted V, is the average of the squares of the deviations
of each value from the mean m of the series.
V= (n1 Ɨ (x1 āˆ’ m)2
+ n2 Ɨ (x2 āˆ’ m)2
+ ... + np Ɨ (xp āˆ’ m)2
)/N
ā€¢ Standard deviation: The standard deviation of a series is the number, noted Ļƒ,
with Ļƒ =āˆšV, where V is the variance of the series.
ā€¢ Max / Min: represented respectively the maximum and minimum mean of the results of the
ten (10) independent runs of each simulation phase.
3.3. Load Balancing Performances
We compare CLOAK-Reduce and the CLOAK DHT, unlike CLOAK DHT, which centralized
load balancing strategy, CLOAK-Reduce has a hierarchical load balancing strategy.
Therefore, our strategy performs a load balancing between a JobManager and its JobManagers
candidate before considering a load balancing between the diļ¬€erent JobManagers of a scheduler
and in extreme cases a load balancing between the schedulers.
Table 1. Mean Response Time efficiency ratio (%)
Nodes
Taks number
Mean
6000 7000 8000 9000 10000
100 41.22 47.11 46.50 44.21 43.21 44.45
300 34.65 45.92 48.34 47.23 45.16 44.26
500 33.93 37.49 36.42 33.59 37.44 35.77
1000 33.35 36.89 36.15 36.69 41.99 37.01
Table 1, We obtain a minimum average response time gain of 35.77% and a maximum of 44.75%
with an overall mean of 40.37%. Figure 8 illustrates the improvement in mean response time
obtained by our load balancing model diļ¬€erent numbers of nodes by varying the number of jobs
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
35
Figure 8. Mean Response Time comparison for varying number of tasks
Figure 9 shows the mean process latency improvement obtained by our load balancing model
diļ¬€erent numbers of nodes by varying the number of tasks. We obtain a minimum average
response time gain of 43.43% and a maximum of 52.06% with an overall mean of 48.18% in
Table 2.
Table 2. Mean Process Latency efficiency ratio (%)
Nodes
Taks number
Mean
6000 7000 8000 9000 10000
100 48.17 52.75 45.50 53.21 42.98 48.50
300 45.56 53.41 55.02 54.09 52.22 52.06
500 39.09 47.14 50.82 51.83 54.69 48.71
1000 33.40 39.47 43.46 48.02 52.82 43.34
Figure 9. Mean Process Latency comparison for varying number of tasks
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
36
Figure 10 illustrates the mean running time improvement obtained by our load balancing model
diļ¬€erent numbers of nodes by varying the number of tasks. We obtain a minimum mean response
time gain of 12.75% and a maximum of 16.46% with an overall average of 14.29% in Table 3.
Table 3. Mean Running Time efficiency ratio (%)
Nodes
Taks number
Mean
6000 7000 8000 9000 10000
100 4.51 10.97 15.44 15.97 16.88 12.75
300 14.83 15.28 17.61 17.40 17.16 16.46
500 12.11 14.10 14.76 14.30 15.92 14.24
1000 9.93 13.62 14.67 14.37 16.02 13.72
Figure 10. Mean Running Time comparison for varying number of tasks
From the diļ¬€erent observations above, we can conļ¬rm that CLOAK-Reduce load balancing
strategy certainly presents better results with respect to the three performance indicators that were
the subject of this study. However, the irregularity of the time saving as a function of the number
of nodes and tasks may be due to underloaded or even inactive nodes as the tasks are submitted
according to a principle described in 3.1.1.
4. CONCLUSIONS AND PERSPECTIVES
This paper addresses the problem of load balancing and scheduling of CLOAK-Reduce tasks. We
proposed a hierarchical and dynamic load balancing model based on the tree structure of the
CLOAK DHT. On this balancing approach using key hashing allowing more or less efficient
affinity between nodes and more deterministic, we defined a hierarchical load balancing strategy
to improve the mean response time of tasks in the model application with minimal
communication.
The experimental results show that the hierarchical architecture of the model allows load
balancing between several JobManagers in charge of job submission and their circular replicas
(candidate JobManagers) or even JobManagers in the same scheduler. These algorithms
complement each other while maintaining centralized management on the scheduler.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
37
Therefore, we have assigned a queue role to the level 0 node. This removal of the root in our load
balancing strategy improves the balancing performance of CLOAK-Reduce.
In the future, we will compare CLOAK-Reduce with other DHT-MapReduce platforms, and we
will perform simulations to demonstrate its performance against distributed processing
architectures.
Finally, we want to see to what extent we can apply this approach to other hybrid storage and
distributed processing platforms.
REFERENCES
[1] Neha Verma, Dheeraj Malhotra, et Jatinder Singh (2020) ā€œBig data analytics for retail industry using
MapReduce-Apriori frameworkā€, Journal of Management Analytics, p. 1-19.
[2] Telesphore Tiendrebeogo, Daouda Ahmat, and Damien Magoni, (2014) ā€œĆ‰valuation de la fiabilitĆ©
dā€™une table de hachage distribuĆ©e construite dans un plan hyperboliqueā€, Technique et Science
Informatique, TSI, Volume 33 - nā—¦ 4/2014, Lavoisier, pages 311ā€“341
[3] Telesphore Tiendrebeogo and Damien Magoni, (2015) ā€œVirtual and consistent hyperbolic tree: A new
structure for distributed database managementā€. In International Conference on Networked Systems,
pages 411ā€“425. Springer, 2015.
[4] Tiendrebeogo, Telesphore, (2015) ā€œA New Spatial Database Management System Using a
Hyperbolic Treeā€, DBKDA 2015: 53.
[5] Telesphore Tiendrebeogo, Mamadou Diarra, (2020) ā€œBig Data Storage System Based on a
Distributed Hash Tables systemā€ International Journal of Database Management Systems (IJDMS)
Vol.12, No.4/5.
[6] Jeffrey Dean and Sanjay Ghemawat, (2008) ā€œMapReduce simplified data processing on large
clustersā€, Communications of the ACM, 51(1) :107ā€“113, 2008.
[7] Than Than Htay and Sabai Phyu, (2020) ā€œImproving the performance of Hadoop MapReduce
Applications via Optimization of concurrent containers per Nodeā€, In: 2020 IEEE Conference on
Computer Applications (ICCA). IEEE, p. 1-5.
[8] Dino, Hivi Ismat, et al. "Impact of load sharing on performance of distributed systems computations."
International Journal of Multidisciplinary Research and Publications (IJMRAP) 3.1 (2020): 30-37.
[9] Gopi, Arepalli Peda, V. Lakshman Narayana, and N. Ashok Kumar., (2018). "Dynamic load
balancing for client server assignment in distributed system using genetical gorithm." IngƩnierie des
SystĆØmes dā€™Information 23.6.
[10] Li, Yun, et al. "Big data and cloud computing." Manual of Digital Earth. Springer, Singapore, 2020.
325-355.
[11] Ian FOSTER., (2005) ā€œGlobus toolkit version 4: Software for service-oriented systemsā€. In Network
and parallel computing. Springer, p. 2ā€“13.
[12] Ion Stoica, Robert Morris, David Liben-Nowell, David R Karger, M Frans Kaashoek, Frank Dabek,
and Hari Balakrishnan., (2003) ā€œChord: a scalable peer-to-peer lookup protocol for internet
applicationsā€. IEEE/ACM Transactions on Networking (TON), 11(1) :17ā€“32.
[13] Nicholas JA Harvey, John Dunagan, Mike Jones, Stefan Saroiu, Marvin Theimer, and Alec Wolman,
(2002) ā€œSkipnet: A scalable overlay network with practical locality propertiesā€
[14] Antony Rowstron and Peter Druschel., (2001) ā€œPastry: Scalable, decentralized object location, and
routing for large-scale peer-to-peer systemsā€. In IFIP / ACM International Conference on Distributed
Systems Platforms and Open Distributed Processing, pages 329ā€“350. Springer.
[15] Petar Maymounkov and David Mazieres. Kademlia, (2002) ā€œA peer-to-peer information system based
on the xor metricā€. In International Workshop on Peer-to-Peer Systems, pages 53ā€“65. Springer.
[16] Ping, Y. (2020). Load balancing algorithms for big data flow classification based on heterogeneous
computing in software definition networks. Journal of Grid Computing, 1-17.
[17] Bhushan, K. (2020). Load Balancing in Cloud Through Task Scheduling. In Recent Trends in
Communication and Intelligent Systems (pp. 195-204). Springer, Singapore.
[18] Gao, X., Liu, R., & Kaushik, A. (2020). Hierarchical multi-agent optimization for resource allocation
in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 32(3), 692-707.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021
38
[19] Abdalkafor, A. S., Jihad, A. A., & Allawi, E. T. (2021). A cloud computing scheduling and its
evolutionary approaches. Indonesian Journal of Electrical Engineering and Computer Science, 21(1),
489-496.
[20] Ebadifard, F., Babamir, S. M., & Barani, S. (2020, April). A dynamic task scheduling algorithm
improved by load balancing in cloud computing. In 2020 6th International Conference on Web
Research (ICWR) (pp. 177-183). IEEE.
[21] Ghomi, E. J., Rahmani, A. M., & Qader, N. N. (2017). Load-balancing algorithms in cloud
computing: A survey. Journal of Network and Computer Applications, 88, 50-71.
[22] Belayadi, D., Hidouci, K. W., Bellatreche, L., & Ordonez, C. (2018). Ɖquilibrage de Distribution de
DonnĆ©es dā€™une Base en MĆ©moire ParallĆØle PartitionnĆ©es par Intervalle. Business Intelligence & Big
Data.
[23] BAERT, Quentin, CARON, Anne-CĆ©cile, MORGE, Maxime, et al., (2019) ā€œStratĆ©gie situationnelle
pour lā€™Ć©quilibrage de charge.
[24] Neghabi, A. A., Navimipour, N. J., Hosseinzadeh, M., & Rezaee, A. (2018). Load balancing
mechanisms in the software defined networks: a systematic and comprehensive review of the
literature. IEEE Access, 6, 14159-14178.
[25] S.Banerjee , J.P. Hecker, (2015) ā€œMulti-Agent System Approach to Load-Balancing and Resource
Allocation for Distributed Computingā€, First Complex Systems Digital Campus World EConference .
[26] Yahya Hassanzadeh-Nazarabadi, Alptekin KĆ¼pĆ§Ć¼, et Ɩznur Ɩzkasap., (2018) ā€œDecentralized and
locality aware replication method for DHT-based P2P storage systems. Future Generation Computer
Systemsā€, vol. 84, p. 32-46.
[27] Surati, S., Jinwala, D. C., & Garg, S. (2017). A survey of simulators for P2P overlay networks with a
case study of the P2P tree overlay using an event-driven simulator. Engineering Science and
Technology, an International Journal, 20(2), 705-720..
AUTHORS
Diarra Mamadou, master degree in information systems and decision support
system in nazi BONI university Burkina Faso. My interest research topic is image
watermarking for decision support and multimedia system.
Telesphore Tiendrebeogo, PhD and overlay network and assistant professor at
Nazi Boni University. I have a master's degree in multimedia and real time system.
My current research is on big data and image watermarking

More Related Content

What's hot

Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storageSurvey on cloud backup services of personal storage
Survey on cloud backup services of personal storageeSAT Journals
Ā 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
Ā 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grideSAT Journals
Ā 
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGDISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGijgca
Ā 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Ā 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSijcses
Ā 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
Ā 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetchingKamal Spring
Ā 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersBaden Hughes
Ā 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingIRJET Journal
Ā 
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmPeer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmIRJET Journal
Ā 

What's hot (16)

Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storageSurvey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
Ā 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
Ā 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
Ā 
G017553540
G017553540G017553540
G017553540
Ā 
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGDISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
Ā 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
Ā 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
Ā 
I017554954
I017554954I017554954
I017554954
Ā 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
Ā 
H017554148
H017554148H017554148
H017554148
Ā 
A01260104
A01260104A01260104
A01260104
Ā 
Performing initiative data prefetching
Performing initiative data prefetchingPerforming initiative data prefetching
Performing initiative data prefetching
Ā 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
Ā 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data Processing
Ā 
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic AlgorithmPeer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Peer-to-Peer Data Sharing and Deduplication using Genetic Algorithm
Ā 
50120130406035
5012013040603550120130406035
50120130406035
Ā 

Similar to Cloak-Reduce Load Balancing Strategy for Mapreduce

MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATION
MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATIONMAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATION
MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATIONijdms
Ā 
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...ijdpsjournal
Ā 
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...ijcsit
Ā 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time IJECEIAES
Ā 
A New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexing
A New Multi-Dimensional Hyperbolic Structure for Cloud Service IndexingA New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexing
A New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexingijdms
Ā 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingIRJET Journal
Ā 
Implementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataImplementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataeSAT Publishing House
Ā 
RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...IJECEIAES
Ā 
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...IJCNCJournal
Ā 
An efficient scheduling policy for load balancing model for computational gri...
An efficient scheduling policy for load balancing model for computational gri...An efficient scheduling policy for load balancing model for computational gri...
An efficient scheduling policy for load balancing model for computational gri...Alexander Decker
Ā 
An optimized cost-based data allocation model for heterogeneous distributed ...
An optimized cost-based data allocation model for  heterogeneous distributed ...An optimized cost-based data allocation model for  heterogeneous distributed ...
An optimized cost-based data allocation model for heterogeneous distributed ...IJECEIAES
Ā 
Vol 3 No 1 - July 2013
Vol 3 No 1 - July 2013Vol 3 No 1 - July 2013
Vol 3 No 1 - July 2013ijcsbi
Ā 
Data Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudData Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudIJAAS Team
Ā 

Similar to Cloak-Reduce Load Balancing Strategy for Mapreduce (20)

MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATION
MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATIONMAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATION
MAP REDUCE BASED ON CLOAK DHT DATA REPLICATION EVALUATION
Ā 
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
Ā 
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
Ā 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time
Ā 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
Ā 
A New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexing
A New Multi-Dimensional Hyperbolic Structure for Cloud Service IndexingA New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexing
A New Multi-Dimensional Hyperbolic Structure for Cloud Service Indexing
Ā 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
Ā 
Implementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big dataImplementation of p pic algorithm in map reduce to handle big data
Implementation of p pic algorithm in map reduce to handle big data
Ā 
J41046368
J41046368J41046368
J41046368
Ā 
2012an20
2012an202012an20
2012an20
Ā 
RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Ā 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...
Ā 
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
NETWORK-AWARE DATA PREFETCHING OPTIMIZATION OF COMPUTATIONS IN A HETEROGENEOU...
Ā 
An efficient scheduling policy for load balancing model for computational gri...
An efficient scheduling policy for load balancing model for computational gri...An efficient scheduling policy for load balancing model for computational gri...
An efficient scheduling policy for load balancing model for computational gri...
Ā 
WJCAT2-13707877
WJCAT2-13707877WJCAT2-13707877
WJCAT2-13707877
Ā 
An optimized cost-based data allocation model for heterogeneous distributed ...
An optimized cost-based data allocation model for  heterogeneous distributed ...An optimized cost-based data allocation model for  heterogeneous distributed ...
An optimized cost-based data allocation model for heterogeneous distributed ...
Ā 
Vol 3 No 1 - July 2013
Vol 3 No 1 - July 2013Vol 3 No 1 - July 2013
Vol 3 No 1 - July 2013
Ā 
[IJET V2I5P18] Authors:Pooja Mangla, Dr. Sandip Kumar Goyal
[IJET V2I5P18] Authors:Pooja Mangla, Dr. Sandip Kumar Goyal[IJET V2I5P18] Authors:Pooja Mangla, Dr. Sandip Kumar Goyal
[IJET V2I5P18] Authors:Pooja Mangla, Dr. Sandip Kumar Goyal
Ā 
Data Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with CloudData Partitioning in Mongo DB with Cloud
Data Partitioning in Mongo DB with Cloud
Ā 

More from AIRCC Publishing Corporation

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
Ā 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSITAIRCC Publishing Corporation
Ā 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
Ā 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
Ā 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
Ā 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
Ā 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
Ā 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
Ā 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
Ā 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
Ā 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
Ā 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
Ā 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
Ā 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
Ā 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
Ā 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
Ā 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
Ā 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
Ā 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
Ā 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...AIRCC Publishing Corporation
Ā 

More from AIRCC Publishing Corporation (20)

Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
Ā 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
Ā 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
Ā 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Ā 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
Ā 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
Ā 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
Ā 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
Ā 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Ā 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
Ā 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
Ā 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
Ā 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Ā 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Ā 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
Ā 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Ā 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Ā 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
Ā 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
Ā 
Call for Articles- International Journal of Computer Science & Information T...
Call for Articles-  International Journal of Computer Science & Information T...Call for Articles-  International Journal of Computer Science & Information T...
Call for Articles- International Journal of Computer Science & Information T...
Ā 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerAnamika Sarkar
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Ā 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Ā 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Ā 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Ā 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Ā 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Ā 

Cloak-Reduce Load Balancing Strategy for Mapreduce

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 DOI: 10.5121/ijcsit.2021.13403 25 CLOAK-REDUCE LOAD BALANCING STRATEGY FOR MAPREDUCE Mamadou Diarra and Telesphore Tiendrebeogo Department of Mathematics and Computer Science, Nazi Boni University, Bobo- Dioulasso, Burkina Faso ABSTRACT The advent of Big Data has seen the emergence of new processing and storage challenges. These challenges are often solved by distributed processing. Distributed systems are inherently dynamic and unstable, so it is realistic to expect that some resources will fail during use. Load balancing and task scheduling is an important step in determining the performance of parallel applications. Hence the need to design load balancing algorithms adapted to grid computing. In this paper, we propose a dynamic and hierarchical load balancing strategy at two levels: Intra- scheduler load balancing, in order to avoid the use of the large-scale communication network, and inter- scheduler load balancing, for a load regulation of our whole system. The strategy allows improving the average response time of CLOAK-Reduce application tasks with minimal communication. We ļ¬rst focus on the three performance indicators, namely response time, process latency and running time of MapReduce tasks. KEYWORDS Big Data, Distributed processing, Load balancing, CLOAK-Reduce, Task allocation 1. INTRODUCTION Information's increasing due to connected objects has seen the emergence of new technology domains oļ¬€ering an alternative to traditional databases. Distributed systems oļ¬€er solutions for high scalability of the information system through service-oriented architectures. Big Data processing can be considered in two main phases: storing the data on a Distributed File System (DFS) and running distributed computations on the data. Different approaches to distributed computing have been proposed for Big Data processing, the most widely used being MapReduce [1]. However, the implementation of distributed systems generates diļ¬ƒculties such as managing node heterogeneity, task governance, degraded mode operation and load balancing. However, load balancing, which consists in allocating data initially and then eventually redistributing it over a set of processors in order to minimise their processing time, remains a real problem for distributed systems.
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 26 Our objective is to propose a load balancing and task allocation strategy for our distributed CLOAK-Reduce model inspired by the CLOAK DHT [2], [3], [4] and MapReduce [1], [6], [7]. We will then evaluate the performance of this strategy simulations. Our study focuses on the following aspects: 1. Our ļ¬rst contribution is the description of the load balancing strategy of CLOAK-Reduce. 2. Our second contribution is to study the quality of the results produced by the analysis of the proposed load balancing strategy. Our paper will be organized as follows: 1. A ļ¬rst step, we discuss the relative work; 2. A second step, we describe our model of the distributed processing platform; 3. The third part, we analyse the results of the diļ¬€erent simulations. 2. RELATED WORKS 2.1. Distributed Systems A distributed system is a heterogeneous set of independent computers that appears to its users as a single coherent system [8]. A distributed system (Figure 1) is an arbitrary set of computing units (Nodes) with its own address space, linked in a network so that they can exchange messages and coordinate their activities. A distributed system is capable of handling any number of processes. Communication between the diļ¬€erent nodes is done by messages. It is important, to consider the communication delay between the diļ¬€erent nodes [9]. Figure 1. Distributed systems computing environment
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 27 2.2. Grid Computing Grid computing is a virtual infrastructure made up of a set of potentially shared, heterogeneous, distributed, autonomous and delocalised computing resources [10]. Grid computing is an autonomous, dynamically reconļ¬gurable, scalable computing infrastructure aggregating a large number of computing and data storage resources. It is intended to make resources available to users of distributed computing. More concretely, a computing grid is made up of a large number of heterogeneous and often delocalized machines linked by an Internet network and made homogeneous to users by middleware [11]. 2.3. Distributed Hash Tables DHT is a technology for constructing a hash table in a distributed system where each piece of data is associated with a key and is distributed over the network. DHTs provide a consistent hash function and eļ¬ƒcient algorithms for storing STORE (key, value) and locating LOOKUP (key) of the node responsible for a given (key, value) pair. It is therefore important to specify that only a reference of the declared object (Object IDentiļ¬er (OID)) is stored in the DHT. Concerning the search for an object, only by routing the searched key can the set of associated values be found [2], [3], [5]. In practice, DHTs are substituted by "overlay" networks on top of the physical networks, thus reducing the size of the table at each node while considerably increasing the eļ¬ƒciency of the search algorithm. DHTs have been widely studied because of their attractive properties: eļ¬ƒciency and simplicity with Chord [12], controlled data placement with SkipNet [13], Pastry [14] routing and localization, and better consistency and reliable performance with Kademlia [15]. CLOAK DHT, the basis of our work, is based on a hyperbolic tree constructed in hyperbolic space (hyperboloid) and stereographically projected into a PoincarĆ© disk (Euclidean plane) of radius 1 centred at the origin where the tree node uses a virtual coordinate system. 2.4. Load balancing A node load is driven by the activity of the processes running locally. Load balancing is the process of distributing network traļ¬ƒc across multiple servers. This ensures no single server bears too much demand. By spreading the work evenly, load balancing improves application responsiveness. It also increases the availability of applications and websites for users [16], [17]. The main goals of load balancing, in a distributed environment, are improving system performance, maintaining stability in the system, building a system which is tolerant to faults and to be able to make modiļ¬cations in the future. However, the load balancing problem has two objectives, to consider [18], [19], [20]: minimising user response time and reducing load imbalance between servers. There are actually two types of load balancing algorithms:
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 28 ā€¢ Dynamic load balancing [21]: In a dynamic algorithm, the least loaded server in the whole system is looking for and preference is given to it to load balancing. Dynamic load balancing offers better performance; Static load balancing [22], [23]: This algorithm needs to have prior information about the system resources in order to be able to make sure that decision of load shifting does not depend on the current system state. Static algorithm is suitable for systems with low load variation. In this paper, we mainly interested in dynamic load balancing which oļ¬€ers us three architectures: centralized, decentralized and hierarchical load balancing algorithms [24]. A dynamic process allocation algorithm consists of two basic elements: an information element and a control element (Figure 2). The role of the information element is to maintain information about the state of the distributed system, which is used by the control element to perform the actual placement of processes [25]. Figure 2. Structure of a dynamic allocation algorithm 2.5. Data Replication The objective of data replication is to increase data availability, reduce data access costs and provide greater fault tolerance [26]. By replicating datasets to an oļ¬€-site location, organisations can more easily recover data after catastrophic events, such as outages, natural disasters, human errors or cyberattacks. 3. OUR CONTRIBUTIONS 3.1. Cloak-Reduce CLOAK-Reduce is built by implementing, on the CLOAK DHT, a module to create and execute MapReduce operations. It is a distributed model that exploits the advantages of CLOAK DHT and MapReduce. CLOAK DHT to submit Map () and Reduce () jobs in a balanced way thanks to the replication mechanisms it oļ¬€ers in addition to the task scheduling strategy we provide (Figure 4)
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 29 The tree structure of the CLOAK DHT allowed us to deļ¬ne a hierarchical architecture of load balancing at two levels: Intra-scheduler for local load balancing and Inter-schedulers for global load balancing (Figure 3). Our model consists of a root node, three schedulers, several candidate nodes or JobManagers candidates and builder nodes or JobBuilders. Figure 3. CLOAK-Reduce Architecture 3.1.1. Summary of the Invention Root node: The root is a node of coordinate (0,0), the minimal depth (D0) tree, of the PoincarĆ© disk. It allows to: ā€¢ Keep tasks that cannot be executed immediately in the root task spool; ā€¢ Maintain schedulers load information; ā€¢ Decide to submit a task to a scheduler. Schedulers: The schedulers of depth (D1), have the function of: ā€¢ Maintain the load information of all their JobManagers; ā€¢ Decide global balancing of their JobManagers; ā€¢ Synchronise their load information with their replicas to manage their failure and the others schedulers for load balancing. JobManagers: JobManagers candidates have a minimum depth (ā‰„ D2). They are elected for: ā€¢ Supervise MapReduce jobs running; ā€¢ Manage the load information related to JobBuilders; ā€¢ Maintain their load state; ā€¢ Decide local load balacing with their circulars replicas JobManager candidate of the same scheduler; ā€¢ Inform JobBuilders of the load balancing decided for the backup of intermediate jobs. JobBuilders: The JobBuilders are of minimum depth (ā‰„ D3). Their function is to: ā€¢ Execute MapReduce jobs; ā€¢ Synchronize the images of their diļ¬€erent works as they go on their radial replicas ā€¢ of the depth > D3. ā€¢ Keep the information on the state of their charge up to date;
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 30 ā€¢ Update this workload information at the JobManager; ā€¢ Perform the balancing necessities ordered by their JobManagers. Figure 4. CLOAK-Reduce function diagram 3.1.2. Load Balancing Strategy Our work consists of load balancing at the JobManager level in a decentralised way, since the JobManagers are independent of each other, which saves response time on the one hand, and allows the selection of the circular replica that best matches the received task on the other. The Scheduler allows local overloaded and underloaded JobManagers to be brought into contact with each other so that they can work together to migrate tasks from one JobManager to the other. 3.1.2.1. Brief Description ā€¢ Each JobManager has a period, during which it sends its load information to the JobManagers candidates of the same scheduler. ā€¢ Each JobManager has a period, during which it sends its load information to its scheduler. ā€¢ Each scheduler has a period, during which it sends its load information to the other schedulers. ā€¢ Each scheduler has a period, during which it sends its load information to the root. ā€¢ Intra-scheduler load balancing is triggered by schedulers or their JobManagers. ā€¢ Intra-scheduler load balancing of JobManager is performed between the JobManagers and its JobManagers candidates to avoid the use of any scheduler communication network. ā€¢ Schedulerā€™s intra-scheduler load balancing favours, where possible, load balancing between JobManagers to avoid the use of any Scheduler communication network. ā€¢ The overloaded scheduler redirects the task to be submitted to the root spool. ā€¢ Inter-scheduler load balancing is triggered by the overloaded schedulers in case intra- scheduler load balancing is not successful.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 31 ā€¢ Inter-scheduler load balancing favours load balancing between schedulers. ā€¢ The root submits pending tasks to schedulers based on a load level. 3.1.2.2. Intra-Scheduler Load Balancing Figure 5, Every JobManager can trigger a load balancing operation based on the current load it is managing. This load is estimated from the various load information sent periodically by the JobBuilders. The information received by JobManager allows it to distribute its load to its candidate JobManagers. When the JobManager load balancing operation fails, the scheduler takes over. The scheduler tries, as a priority, to balance the load of the JobManager locally by distributing it among the JobManagers that are under its control. This locality approach aims to reduce communication costs, by avoiding inter-scheduler communications. Figure 5. Intra-scheduler load balancing 3.1.2.3. Inter-Scheduler Load Balancing Figure 6, Inter-scheduler load balancing is triggered only when intra-scheduler balancing fails due to either JobManager saturation or insuļ¬ƒcient load supply from candidate JobManagers compared to the demand from overloaded JobManagers. In this case, the overloaded scheduler transfers the new submissions to the root. Also, the root, according to the scheduler information, can ask the overloaded scheduler to perform an inter-scheduler load balancing, considering the allocation costs and the choice of the tasks to be selected.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 32 Figure 6. Inter-schedulers load balancing 3.1.3. Brief Description of Some Load Balancing Algorithms We focus on the mean response time, the mean process latency, and the mean running time of a task as a JobManager load. Notations: ā€¢ Break-even point for JobManagers: ļƒ¼ Ī±j: Response time, ļƒ¼ Ī²j: Process latency, ļƒ¼ Ē«j: Running time for jobs. ā€¢ Break-even point for Scedulers: ļƒ¼ Ī±s: Response time, ļƒ¼ Ī²s: Process latency, ļƒ¼ Ē«s: Running time for jobs. ā€¢ Nodes: ā€¢ Jb: JobBuilder, ā€¢ Jm : JobManager, ā€¢ Jmc: JobManager candidate, ā€¢ S: Scheduler, ā€¢ R: Root ā€¢ Variables: ā€¢ Ļ„r : Jb response time , ā€¢ Ļ„a : Jb process latency , ā€¢ Ļ„e : Jb running time, ā€¢ Ī¦r : Jm response time, ā€¢ Ī¦a :Jm process latency, ā€¢ Ī¦e : Jm running time
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 33 Figure 7. Some Algorithms 3.2. Performance Analysis 3.2.1. Experimental setup For data collection, the circular and radial replication mechanisms of CLOAK-Reduce have been set to ļ¬ve (05), in a dynamic network with 10% churns, have been required. In order to study the scalability of the system in addition to load balancing, we opted to consider a random number of nodes as follows: 100, 300, 500 and 1000, with the number of tasks varying from 6000 to 10000 in steps of 1000. The data processed in the rest of this paper are the result of ten (10) independent recurrence of each simulation phase in order to extract a signiļ¬cant mean. This collection allowed us to conduct a comparative study on the Intra-Scheduler and Inter- Schedulers load balancing strategy. This limitation is due to the hardware constraints of the machine to run the simulation. All experiments were performed on a 2.60 GHz Intel Core i5 CPU PC with 8 GB memory running Windows 10 Professional. To achieve our simulation objectives, we opted to use the PeerSim simulator. 3.2.2. Simulator ā€¢ PeerSim [27] is a simulator whose main objective is to provide high scalability, with network sizes up to 1000000 nodes, which characterises its dynamics and extensibility. Its modularity facilitates the coding of new applications. The PeerSim conļ¬guration ļ¬le has three types of components: protocols, dynamics and observers. ā€¢ Simulation [27] is a widely used method for performance evaluation. It consists of observing the behaviour of a simpliļ¬ed model of the real system with the help of an
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 34 appropriate simulation program which will result in graphs that are easy to analyse and interpret. This method is closer to the real model than analytical methods, and is used when evaluation of direct measure becomes very expensive. 3.2.3. Some Performance Indicators We are interested in reducing the response time, the process latency for jobs, and the running time of MapReduce tasks. The following performance metrics have been analysed in order to measure the performance. ā€¢ Mean Response Time: This is the time spent in the queue of ready processes before the ļ¬rst execution. To calculate the mean response time (MRT) of the processes we use the following formula: With Ļ„ri= completion time - arrival date ā€¢ Mean Process Latency: This is the mean time a process spends waiting. The mean process latency (MPL) is calculated as follows With Ļ„ai= Ļ„ri - running time ā€¢ Running Time: or Restitution time is the time that elapses between the submission of the job and its completion. ā€¢ Variance: The variance of a series, noted V, is the average of the squares of the deviations of each value from the mean m of the series. V= (n1 Ɨ (x1 āˆ’ m)2 + n2 Ɨ (x2 āˆ’ m)2 + ... + np Ɨ (xp āˆ’ m)2 )/N ā€¢ Standard deviation: The standard deviation of a series is the number, noted Ļƒ, with Ļƒ =āˆšV, where V is the variance of the series. ā€¢ Max / Min: represented respectively the maximum and minimum mean of the results of the ten (10) independent runs of each simulation phase. 3.3. Load Balancing Performances We compare CLOAK-Reduce and the CLOAK DHT, unlike CLOAK DHT, which centralized load balancing strategy, CLOAK-Reduce has a hierarchical load balancing strategy. Therefore, our strategy performs a load balancing between a JobManager and its JobManagers candidate before considering a load balancing between the diļ¬€erent JobManagers of a scheduler and in extreme cases a load balancing between the schedulers. Table 1. Mean Response Time efficiency ratio (%) Nodes Taks number Mean 6000 7000 8000 9000 10000 100 41.22 47.11 46.50 44.21 43.21 44.45 300 34.65 45.92 48.34 47.23 45.16 44.26 500 33.93 37.49 36.42 33.59 37.44 35.77 1000 33.35 36.89 36.15 36.69 41.99 37.01 Table 1, We obtain a minimum average response time gain of 35.77% and a maximum of 44.75% with an overall mean of 40.37%. Figure 8 illustrates the improvement in mean response time obtained by our load balancing model diļ¬€erent numbers of nodes by varying the number of jobs
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 35 Figure 8. Mean Response Time comparison for varying number of tasks Figure 9 shows the mean process latency improvement obtained by our load balancing model diļ¬€erent numbers of nodes by varying the number of tasks. We obtain a minimum average response time gain of 43.43% and a maximum of 52.06% with an overall mean of 48.18% in Table 2. Table 2. Mean Process Latency efficiency ratio (%) Nodes Taks number Mean 6000 7000 8000 9000 10000 100 48.17 52.75 45.50 53.21 42.98 48.50 300 45.56 53.41 55.02 54.09 52.22 52.06 500 39.09 47.14 50.82 51.83 54.69 48.71 1000 33.40 39.47 43.46 48.02 52.82 43.34 Figure 9. Mean Process Latency comparison for varying number of tasks
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 36 Figure 10 illustrates the mean running time improvement obtained by our load balancing model diļ¬€erent numbers of nodes by varying the number of tasks. We obtain a minimum mean response time gain of 12.75% and a maximum of 16.46% with an overall average of 14.29% in Table 3. Table 3. Mean Running Time efficiency ratio (%) Nodes Taks number Mean 6000 7000 8000 9000 10000 100 4.51 10.97 15.44 15.97 16.88 12.75 300 14.83 15.28 17.61 17.40 17.16 16.46 500 12.11 14.10 14.76 14.30 15.92 14.24 1000 9.93 13.62 14.67 14.37 16.02 13.72 Figure 10. Mean Running Time comparison for varying number of tasks From the diļ¬€erent observations above, we can conļ¬rm that CLOAK-Reduce load balancing strategy certainly presents better results with respect to the three performance indicators that were the subject of this study. However, the irregularity of the time saving as a function of the number of nodes and tasks may be due to underloaded or even inactive nodes as the tasks are submitted according to a principle described in 3.1.1. 4. CONCLUSIONS AND PERSPECTIVES This paper addresses the problem of load balancing and scheduling of CLOAK-Reduce tasks. We proposed a hierarchical and dynamic load balancing model based on the tree structure of the CLOAK DHT. On this balancing approach using key hashing allowing more or less efficient affinity between nodes and more deterministic, we defined a hierarchical load balancing strategy to improve the mean response time of tasks in the model application with minimal communication. The experimental results show that the hierarchical architecture of the model allows load balancing between several JobManagers in charge of job submission and their circular replicas (candidate JobManagers) or even JobManagers in the same scheduler. These algorithms complement each other while maintaining centralized management on the scheduler.
  • 13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 37 Therefore, we have assigned a queue role to the level 0 node. This removal of the root in our load balancing strategy improves the balancing performance of CLOAK-Reduce. In the future, we will compare CLOAK-Reduce with other DHT-MapReduce platforms, and we will perform simulations to demonstrate its performance against distributed processing architectures. Finally, we want to see to what extent we can apply this approach to other hybrid storage and distributed processing platforms. REFERENCES [1] Neha Verma, Dheeraj Malhotra, et Jatinder Singh (2020) ā€œBig data analytics for retail industry using MapReduce-Apriori frameworkā€, Journal of Management Analytics, p. 1-19. [2] Telesphore Tiendrebeogo, Daouda Ahmat, and Damien Magoni, (2014) ā€œĆ‰valuation de la fiabilitĆ© dā€™une table de hachage distribuĆ©e construite dans un plan hyperboliqueā€, Technique et Science Informatique, TSI, Volume 33 - nā—¦ 4/2014, Lavoisier, pages 311ā€“341 [3] Telesphore Tiendrebeogo and Damien Magoni, (2015) ā€œVirtual and consistent hyperbolic tree: A new structure for distributed database managementā€. In International Conference on Networked Systems, pages 411ā€“425. Springer, 2015. [4] Tiendrebeogo, Telesphore, (2015) ā€œA New Spatial Database Management System Using a Hyperbolic Treeā€, DBKDA 2015: 53. [5] Telesphore Tiendrebeogo, Mamadou Diarra, (2020) ā€œBig Data Storage System Based on a Distributed Hash Tables systemā€ International Journal of Database Management Systems (IJDMS) Vol.12, No.4/5. [6] Jeffrey Dean and Sanjay Ghemawat, (2008) ā€œMapReduce simplified data processing on large clustersā€, Communications of the ACM, 51(1) :107ā€“113, 2008. [7] Than Than Htay and Sabai Phyu, (2020) ā€œImproving the performance of Hadoop MapReduce Applications via Optimization of concurrent containers per Nodeā€, In: 2020 IEEE Conference on Computer Applications (ICCA). IEEE, p. 1-5. [8] Dino, Hivi Ismat, et al. "Impact of load sharing on performance of distributed systems computations." International Journal of Multidisciplinary Research and Publications (IJMRAP) 3.1 (2020): 30-37. [9] Gopi, Arepalli Peda, V. Lakshman Narayana, and N. Ashok Kumar., (2018). "Dynamic load balancing for client server assignment in distributed system using genetical gorithm." IngĆ©nierie des SystĆØmes dā€™Information 23.6. [10] Li, Yun, et al. "Big data and cloud computing." Manual of Digital Earth. Springer, Singapore, 2020. 325-355. [11] Ian FOSTER., (2005) ā€œGlobus toolkit version 4: Software for service-oriented systemsā€. In Network and parallel computing. Springer, p. 2ā€“13. [12] Ion Stoica, Robert Morris, David Liben-Nowell, David R Karger, M Frans Kaashoek, Frank Dabek, and Hari Balakrishnan., (2003) ā€œChord: a scalable peer-to-peer lookup protocol for internet applicationsā€. IEEE/ACM Transactions on Networking (TON), 11(1) :17ā€“32. [13] Nicholas JA Harvey, John Dunagan, Mike Jones, Stefan Saroiu, Marvin Theimer, and Alec Wolman, (2002) ā€œSkipnet: A scalable overlay network with practical locality propertiesā€ [14] Antony Rowstron and Peter Druschel., (2001) ā€œPastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systemsā€. In IFIP / ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, pages 329ā€“350. Springer. [15] Petar Maymounkov and David Mazieres. Kademlia, (2002) ā€œA peer-to-peer information system based on the xor metricā€. In International Workshop on Peer-to-Peer Systems, pages 53ā€“65. Springer. [16] Ping, Y. (2020). Load balancing algorithms for big data flow classification based on heterogeneous computing in software definition networks. Journal of Grid Computing, 1-17. [17] Bhushan, K. (2020). Load Balancing in Cloud Through Task Scheduling. In Recent Trends in Communication and Intelligent Systems (pp. 195-204). Springer, Singapore. [18] Gao, X., Liu, R., & Kaushik, A. (2020). Hierarchical multi-agent optimization for resource allocation in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 32(3), 692-707.
  • 14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 13, No 4, August 2021 38 [19] Abdalkafor, A. S., Jihad, A. A., & Allawi, E. T. (2021). A cloud computing scheduling and its evolutionary approaches. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), 489-496. [20] Ebadifard, F., Babamir, S. M., & Barani, S. (2020, April). A dynamic task scheduling algorithm improved by load balancing in cloud computing. In 2020 6th International Conference on Web Research (ICWR) (pp. 177-183). IEEE. [21] Ghomi, E. J., Rahmani, A. M., & Qader, N. N. (2017). Load-balancing algorithms in cloud computing: A survey. Journal of Network and Computer Applications, 88, 50-71. [22] Belayadi, D., Hidouci, K. W., Bellatreche, L., & Ordonez, C. (2018). Ɖquilibrage de Distribution de DonnĆ©es dā€™une Base en MĆ©moire ParallĆØle PartitionnĆ©es par Intervalle. Business Intelligence & Big Data. [23] BAERT, Quentin, CARON, Anne-CĆ©cile, MORGE, Maxime, et al., (2019) ā€œStratĆ©gie situationnelle pour lā€™Ć©quilibrage de charge. [24] Neghabi, A. A., Navimipour, N. J., Hosseinzadeh, M., & Rezaee, A. (2018). Load balancing mechanisms in the software defined networks: a systematic and comprehensive review of the literature. IEEE Access, 6, 14159-14178. [25] S.Banerjee , J.P. Hecker, (2015) ā€œMulti-Agent System Approach to Load-Balancing and Resource Allocation for Distributed Computingā€, First Complex Systems Digital Campus World EConference . [26] Yahya Hassanzadeh-Nazarabadi, Alptekin KĆ¼pĆ§Ć¼, et Ɩznur Ɩzkasap., (2018) ā€œDecentralized and locality aware replication method for DHT-based P2P storage systems. Future Generation Computer Systemsā€, vol. 84, p. 32-46. [27] Surati, S., Jinwala, D. C., & Garg, S. (2017). A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator. Engineering Science and Technology, an International Journal, 20(2), 705-720.. AUTHORS Diarra Mamadou, master degree in information systems and decision support system in nazi BONI university Burkina Faso. My interest research topic is image watermarking for decision support and multimedia system. Telesphore Tiendrebeogo, PhD and overlay network and assistant professor at Nazi Boni University. I have a master's degree in multimedia and real time system. My current research is on big data and image watermarking