The scheduler for the grid­system based on the parameters monitoring of the computer components




distributed computer system, computing resource management, task scheduling, compute node parameters monitoring


The structure of the centralized distributed computer system (DCS) task scheduler, which uses the adaptive resource security management mechanism was developed. By interacting with local agents of the given compute nodes, the scheduler defines the system node parameters and selects the resources with the specified security and performance requirements. Ensuring an optimum combination of mutually exclusive security and performance parameters is a non-trivial task, requiring the development of new approaches to solving it.

The research found that the adaptive distributed system resource security management mechanism increases the DCS performance in comparison with the classical resource security management mechanism. In particular, the research shows that the average task time in the queue and the average task time in the system with the adaptive security level management mechanism is 2.8 and 2.1 times lower, respectively, in comparison with the classical security level management mechanism. At the same time, the adaptive security management introduction requires additional software on the DCS compute nodes for the CN status parameters monitoring. The experiments demonstrate that the monitoring system can significantly reduce the DCS performance. Thus, according to the experiments, in case of 25 % load on the DCS CN from the monitoring system, the average task time in the queue and the average task time in the system increase by 62 % compared with a situation where monitoring is not performed.

The research results need to be considered when introducing the secure data processing mechanisms in DCS to prevent a substantial decrease in the distributed system performance.

Author Biographies

Hu Zhenbing, School of Educational Information Technology Central China Normal University Louyu str., 152, Wuhan, China, 430079


Vadym Mukhin, National Technical University of Ukraine «Igor Sikorsky Kiev Polytechnic Institute» Peremohy ave., 37, Kyiv, Ukraine, 03056

Doctor of Technical Sciences

Department of Computing Technics

Yaroslav Kornaga, National Technical University of Ukraine «Igor Sikorsky Kiev Polytechnic Institute» Peremohy ave., 37, Kyiv, Ukraine, 03056


Department of Technical Cybernetics 

Oksana Herasymenko, Taras Shevchenko National University of Kyiv Volodymyrska str., 60, Kyiv, Ukraine, 01033


Department of Networking and Internet technologies

Yurii Bazaka, National Technical University of Ukraine «Igor Sikorsky Kiev Polytechnic Institute» Peremohy ave., 37, Kyiv, Ukraine, 03056

Postgraduate student

Department of Technical Cybernetics


  1. Zhu, Y., Ni, L. M. (2013). A Survey on Grid Scheduling Systems. Technical Report # SJTU_CS_TR_200309001. Shanghai Jiao Tong University, 41. Available at:
  2. Qureshi, M. B., Dehnavi, M. M., Min-Allah, N., Qureshi, M. S., Hussain, H., Rentifis, I. et. al. (2014). Survey on Grid Resource Allocation Mechanisms. Journal of Grid Computing, 12 (2), 399–441. doi: 10.1007/s10723-014-9292-9
  3. Lin, W., Liang, C., Wang, J. Z., Buyya, R. (2012). Bandwidth-aware divisible task scheduling for cloud computing. Software: Practice and Experience, 44 (2), 163–174. doi: 10.1002/spe.2163
  4. Caminero, A., Rana, O., Caminero, B., Carrion, C. (2011). Network-aware heuristics for inter-domain meta-scheduling in Grids. Journal of Computer and System Sciences, 77 (2), 262–281. doi: 10.1016/j.jcss.2010.01.006
  5. Jin, J., Luo, J., Song, A., Dong, F., Xiong, R. (2011). BAR: An Efficient Data Locality Driven Task Scheduling Algorithm for Cloud Computing. 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. doi: 10.1109/ccgrid.2011.55
  6. Yang, C.-T., Leu, F.-Y., Chen, S.-Y. (2008). Network Bandwidth-aware job scheduling with dynamic information model for Grid resource brokers. The Journal of Supercomputing, 52 (3), 199–223. doi: 10.1007/s11227-008-0256-3
  7. McClatchey, R., Anjum, A., Stockinger, H., Ali, A., Willers, I., Thomas, M. Scheduling in Data Intensive and Network Aware (DIANA) Grid Environments Architecture. Available at:
  8. Singh, R. (2016). Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing. International Journal of Computer Network and Information Security, 8 (8), 59–66. doi: 10.5815/ijcnis.2016.08.07
  9. Wu, X., Deng, M., Zhang, R., Zeng, B., Zhou, S. (2013). A Task Scheduling Algorithm based on QoS-Driven in Cloud Computing. Procedia Computer Science, 17, 1162–1169. doi: 10.1016/j.procs.2013.05.148
  10. Chauhan, S. S., Joshi, R. C. (2010). A heuristic for QoS based independent task scheduling in Grid environment. 2010 5th International Conference on Industrial and Information Systems. doi: 10.1109/iciinfs.2010.5578725
  11. Ang, T. F., Ling, T. Ch., Phang, K. K. (2012). Adaptive QoS scheduling in a service-oriented grid environment. Turk Journal of Electronic Engineering & Computer Science, 20 (3), 413–424.
  12. Conejero, J., Tomas, L., Caminero, B., Carrion, C. (2012). QoS Provisioning by Meta-scheduling via advance within SLA-based Grid Environments. Computing and Informatics, 31, 73–88.
  13. Liu, H., Abraham, A., Snasel, V., McLoone, S. (2012). Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments. Information Sciences, 192, 228–243. doi: 10.1016/j.ins.2011.12.032
  14. Yang, Y. L., Peng, X. G., Cao, J. F. (2015). Trust-Based Scheduling Strategy for Cloud Workflow Applications. Informatica, 26 (1), 159–180. doi: 10.15388/informatica.2015.43
  15. Buyya, R., Murshed, M. (2002). GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing. Concurrency and Computation: Practice and Experience, 14 (13-15), 1175–1220. doi: 10.1002/cpe.710
  16. Klusacek, D., Rudova, H. (2010). Alea 2: job scheduling simulator. Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques. doi: 10.4108/icst.simutools2010.8722
  17. Logs of Real Parallel Workloads from Production Systems. Available at:
  18. The Grid Workloads Archive: The Grid Workloads Datasets. Available at:
  19. Bhuyan, M. H., Bhattacharyya, D. K., Kalita, J. K. (2014). Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys & Tutorials, 16 (1), 303–336. doi: 10.1109/surv.2013.052213.00046
  20. Heidarian, Z., Movahedinia, N., Moghim, N., Mahdinia, P. (2015). Intrusion Detection Based on Normal Traffic Specifications. International Journal of Computer Network and Information Security, 7 (9), 32–38. doi: 10.5815/ijcnis.2015.09.04
  21. Khobzaoui, A., Yousfate, A. (2016). Intrusion Detection with Multi-Connected Representation. International Journal of Computer Network and Information Security, 8 (1), 35–42. doi: 10.5815/ijcnis.2016.01.05
  22. Liao, H.-J., Richard Lin, C.-H., Lin, Y.-C., Tung, K.-Y. (2013). Intrusion detection system: A comprehensive review. Journal of Network and Computer Applications, 36 (1), 16–24. doi: 10.1016/j.jnca.2012.09.004
  23. Mukhin, V. Ye., Bidkov, A. Y., Duc, T. V. (2012). The Forming of Trust Level to the Nodes in the Distributed Computer Systems. Modern Problems of Radio Engineering, Telecommunications and Computer Science TCSET’2012. Lviv, 362.




How to Cite

Zhenbing, H., Mukhin, V., Kornaga, Y., Herasymenko, O., & Bazaka, Y. (2017). The scheduler for the grid­system based on the parameters monitoring of the computer components. Eastern-European Journal of Enterprise Technologies, 1(2 (85), 31–39.