We address dynamic elasticity issues of VM provisioning in a heterogeneous distributed computing environment that integrates resources of a data center. We consider the scenario when the center includes dedicated reso...
详细信息
ISBN:
(纸本)9781538678800
We address dynamic elasticity issues of VM provisioning in a heterogeneous distributed computing environment that integrates resources of a data center. We consider the scenario when the center includes dedicated resources (private cloud) for providing virtualized service and non-dedicated resources for Grid-computing. Existing platforms for the resource virtualization does not support management of such an infrastructure. We propose an approach to a job management based on the dynamic elasticity of virtual machines provisioning using resources of both types. We develop the multi¬agent job scheduler for dedicated resources and hypervisor shell to launch virtual machines through queues of resource management syst.ms in non-dedicated resources. The scheduler provides a dynamic elasticity of virtual machine provisioning. Advantages of the offered approach to the resource virtualization are demonstrated by an example of a job flow management for a scalable application to solve the complicated practical problem. It is related to the energy security of Vietnam. Provided experiments show that using the developed tools together with the platform for the resource virtualization enables agents to significantly speed up the problem-solving process.
Networks of human interactions (like social and mobile call networks) in most cases inherit natural properties of society, e.g. community structure or tie strength. The method for generating large random mobile call g...
详细信息
Networks of human interactions (like social and mobile call networks) in most cases inherit natural properties of society, e.g. community structure or tie strength. The method for generating large random mobile call graphs is introduced. Generated graphs reflect real network properties, such as community structure or Double Pareto Log-Normal degree distribution. Generation time is linear in the number of edges. The proposed method is intended to facilitate evaluation of algorithms designed for mobile call network analysis.
Leveraged by the success of applications aiming at the "free" sharing of data in the Internet, the paradigm of peer-to-peer (P2P) computing has been devoted substantial consideration recently. This paper pre...
详细信息
ISBN:
(纸本)9781581135992
Leveraged by the success of applications aiming at the "free" sharing of data in the Internet, the paradigm of peer-to-peer (P2P) computing has been devoted substantial consideration recently. This paper presents an abstraction for remote object interaction in a P2P environment, called borrow/lend (BL). We present the principles underlying our BL abstraction, and its implementation in Java. We contrast our abstraction with established abstractions for distributed programming such as the remote method invocation or the tuple space, illustrating how the BL abstraction, obviously influenced by such predating abstractions, unifies flavors of these, but also how it captures the constraints specific to P2P environments.
The mpC language and its supportive portable programming environment are aimed at efficiently-portable modular parallel programming heterogeneous networks of computers (HNCs). Unlike traditional tools used for portabl...
详细信息
The mpC language and its supportive portable programming environment are aimed at efficiently-portable modular parallel programming heterogeneous networks of computers (HNCs). Unlike traditional tools used for portable programming HNCs, mpC provides more advanced facilities for process management to support efficient portability. The paper presents the abstraction of network object introduced in the mpC language to manage processes constituting a message-passing program in order to ensure efficient execution of mpC applications on any particular HNC. The main attention is paid to the translation of this high-level mechanism into low-level notions of target message-passing programs.
暂无评论