The scheduler for the gridsystem based on the parameters monitoring of the computer components
DOI:
https://doi.org/10.15587/1729-4061.2017.91271Keywords:
distributed computer system, computing resource management, task scheduling, compute node parameters monitoringAbstract
The structure of the centralized distributed computer system (DCS) task scheduler, which uses the adaptive resource security management mechanism was developed. By interacting with local agents of the given compute nodes, the scheduler defines the system node parameters and selects the resources with the specified security and performance requirements. Ensuring an optimum combination of mutually exclusive security and performance parameters is a non-trivial task, requiring the development of new approaches to solving it.
The research found that the adaptive distributed system resource security management mechanism increases the DCS performance in comparison with the classical resource security management mechanism. In particular, the research shows that the average task time in the queue and the average task time in the system with the adaptive security level management mechanism is 2.8 and 2.1 times lower, respectively, in comparison with the classical security level management mechanism. At the same time, the adaptive security management introduction requires additional software on the DCS compute nodes for the CN status parameters monitoring. The experiments demonstrate that the monitoring system can significantly reduce the DCS performance. Thus, according to the experiments, in case of 25 % load on the DCS CN from the monitoring system, the average task time in the queue and the average task time in the system increase by 62 % compared with a situation where monitoring is not performed.
The research results need to be considered when introducing the secure data processing mechanisms in DCS to prevent a substantial decrease in the distributed system performance.
References
- Zhu, Y., Ni, L. M. (2013). A Survey on Grid Scheduling Systems. Technical Report # SJTU_CS_TR_200309001. Shanghai Jiao Tong University, 41. Available at: http://www.cs.sjtu.edu.cn/~yzhu/reports/SJTU_CS_TR_200309001.pdf
- Qureshi, M. B., Dehnavi, M. M., Min-Allah, N., Qureshi, M. S., Hussain, H., Rentifis, I. et. al. (2014). Survey on Grid Resource Allocation Mechanisms. Journal of Grid Computing, 12 (2), 399–441. doi: 10.1007/s10723-014-9292-9
- Lin, W., Liang, C., Wang, J. Z., Buyya, R. (2012). Bandwidth-aware divisible task scheduling for cloud computing. Software: Practice and Experience, 44 (2), 163–174. doi: 10.1002/spe.2163
- Caminero, A., Rana, O., Caminero, B., Carrion, C. (2011). Network-aware heuristics for inter-domain meta-scheduling in Grids. Journal of Computer and System Sciences, 77 (2), 262–281. doi: 10.1016/j.jcss.2010.01.006
- Jin, J., Luo, J., Song, A., Dong, F., Xiong, R. (2011). BAR: An Efficient Data Locality Driven Task Scheduling Algorithm for Cloud Computing. 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. doi: 10.1109/ccgrid.2011.55
- Yang, C.-T., Leu, F.-Y., Chen, S.-Y. (2008). Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers. The Journal of Supercomputing, 52 (3), 199–223. doi: 10.1007/s11227-008-0256-3
- McClatchey, R., Anjum, A., Stockinger, H., Ali, A., Willers, I., Thomas, M. Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments Architecture. Available at: https://arxiv.org/ftp/arxiv/papers/0707/0707.0862.pdf
- Singh, R. (2016). Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing. International Journal of Computer Network and Information Security, 8 (8), 59–66. doi: 10.5815/ijcnis.2016.08.07
- Wu, X., Deng, M., Zhang, R., Zeng, B., Zhou, S. (2013). A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing. Procedia Computer Science, 17, 1162–1169. doi: 10.1016/j.procs.2013.05.148
- Chauhan, S. S., Joshi, R. C. (2010). A heuristic for QoS based independent task scheduling in Grid environment. 2010 5th International Conference on Industrial and Information Systems. doi: 10.1109/iciinfs.2010.5578725
- Ang, T. F., Ling, T. Ch., Phang, K. K. (2012). Adaptive QoS scheduling in a service-oriented grid environment. Turk Journal of Electronic Engineering & Computer Science, 20 (3), 413–424.
- Conejero, J., Tomas, L., Caminero, B., Carrion, C. (2012). QoS Provisioning by Meta-scheduling via advance within SLA-based Grid Environments. Computing and Informatics, 31, 73–88.
- Liu, H., Abraham, A., Snasel, V., McLoone, S. (2012). Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments. Information Sciences, 192, 228–243. doi: 10.1016/j.ins.2011.12.032
- Yang, Y. L., Peng, X. G., Cao, J. F. (2015). Trust-Based Scheduling Strategy for Cloud Workflow Applications. Informatica, 26 (1), 159–180. doi: 10.15388/informatica.2015.43
- Buyya, R., Murshed, M. (2002). GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing. Concurrency and Computation: Practice and Experience, 14 (13-15), 1175–1220. doi: 10.1002/cpe.710
- Klusacek, D., Rudova, H. (2010). Alea 2: job scheduling simulator. Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques. doi: 10.4108/icst.simutools2010.8722
- Logs of Real Parallel Workloads from Production Systems. Available at: http://www.cs.huji.ac.il/labs/parallel/workload/logs.html
- The Grid Workloads Archive: The Grid Workloads Datasets. Available at: http://gwa.ewi.tudelft.nl/datasets/
- Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. (2014). Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys & Tutorials, 16 (1), 303–336. doi: 10.1109/surv.2013.052213.00046
- Heidarian, Z., Movahedinia, N., Moghim, N., Mahdinia, P. (2015). Intrusion Detection Based on Normal Traffic Specifications. International Journal of Computer Network and Information Security, 7 (9), 32–38. doi: 10.5815/ijcnis.2015.09.04
- Khobzaoui, A., Yousfate, A. (2016). Intrusion Detection with Multi-Connected Representation. International Journal of Computer Network and Information Security, 8 (1), 35–42. doi: 10.5815/ijcnis.2016.01.05
- Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36 (1), 16–24. doi: 10.1016/j.jnca.2012.09.004
- Mukhin, V. Ye., Bidkov, A. Y., Duc, T. V. (2012). The Forming of Trust Level to the Nodes in the Distributed Computer Systems. Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET’2012. Lviv, 362.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Zhenbing Hu, Vadym Mukhin, Yaroslav Kornaga, Oksana Herasymenko, Yurii Bazaka
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.