SlideShare une entreprise Scribd logo
1  sur  19
Load Balancing in
Cloud Computing
Cloud Computing
Broad network access
Rapid Elasticity
Pay as you go (Measured Service)
On Demand
Cloud Computing
SalesForc
e
Gmail
Goog
le
App
Engin
e
Virtualization
Cost Effectiveness
Operation efficiency
Heterogeneous Environment
Load Balancing (Distributed Environment)
Improving Performance
Redistribution of Load
Better Response time
Resource Sharing & utilization
Load Balancing
Load Balancing
Virtual Machine
Migration
− Transfer virtual
CPU,device
states,memory data
Trigger
Strategy
Algorithm

Trigger Migration if
Cm >T

New Scenario
− Sources (Ci close to CdiffMax)
− Destination(Ci Close to
CdiffMin)
Throttled load balancing
Ensured for predefined number of cloudlets
Components :
Load balancer
Virtual machines
Data center controller
Throttled load balancing
Throttled load balancing
Data center
controller
Load balancer
Finds VM
Sends VM Id to DCC
Assign request to VM
Index table of VM &
state of VM
DCC notifies LB
Trust and Reliability based Algorithm
•Better distribution of load and improved QOS
•Trust value that is calculated by the trust model on basis of different
parameters are used to prioritize the datacenters and scheduling algorithms
to make use of these trust values ie. To schedule the request based on trust
values.
•Based on trust value load balancing is done for better selection of node for
better balancing of load.
•In cloud Iaas, we use load balancing algo to distribute the load, better
resource utilization and better QOS to the user.
•Based on trust values of the domain resources are assigned to the user
Trust based Algorithm
•Trust model are used to calculate the trust values for datacenters based on
the parameters which are as follows:
1. Initialization time : time taken to allocate resources requested and
deploy them
2. Machine Instruction Per Second(MIPS) : Number of instructions
completed per second
3. Fault rate: Number of faults in a period of time
•Trust values are calculated for each datacenters
•Updated after a fixed period of time
Whole cycle –
1. Initialization- trust value of data center and client is initialized
•data center is assigned the trust value on the basis of parameters and
updated periodically
•If the new data center is introduced, it is assigned with default trust value
•All the parameters are initialized
•Fault rate is initialized with default values for all datacenters
2. Load Balancing
•Done using prioritized list of data centers and client trust
•Listing of trusted and untrusted datacenters is done
•Trusted node list consists of nodes having trust value greater than
threshold value in decreasing order ie. The first node has the highest trust
value
•Untrusted node list consists of nodes having trust value lesser than
threshold value in decreasing order
Working
•1. untrusted user
•When node gets overloaded, VM with lowest trust value is migrated
•Check selected VM is of public user or private user
•If public, node to which VM is to be migrated is selected from untrusted
list
•2. trusted user
3. Trust Evolution
•Updating datacentre trust value periodically after a fixed interval of time
•Monitor behaviour of the datacentre on basis of fault rate and initialization
time
•Parameter value changes when load on data center increases/decreases
•Let datacenters Di and attributes Ai1(initialization time), Ai2(MIPS),
Ai3(Fault rate) and their corresponding trust value Ti
•Value to be updated-
Trust and Reliability Based Algorithm
Thank you

Contenu connexe

Tendances

Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
David Spinks
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
Adeel Javaid
 
LOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMSLOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMS
tanmayshah95
 

Tendances (20)

Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
What is load balancer in aws and types of load balancers
What is load balancer in aws and  types of load balancersWhat is load balancer in aws and  types of load balancers
What is load balancer in aws and types of load balancers
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
AWS Simple Storage Service (s3)
AWS Simple Storage Service (s3) AWS Simple Storage Service (s3)
AWS Simple Storage Service (s3)
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 
LOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMSLOAD BALANCING ALGORITHMS
LOAD BALANCING ALGORITHMS
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Introduction to CloudFront
Introduction to CloudFrontIntroduction to CloudFront
Introduction to CloudFront
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
CloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming SyntaxCloudSim : Introduction and Basic Programming Syntax
CloudSim : Introduction and Basic Programming Syntax
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Message Oriented Middleware
Message Oriented MiddlewareMessage Oriented Middleware
Message Oriented Middleware
 
Service level agreement in cloud computing an overview
Service level agreement in cloud computing  an overviewService level agreement in cloud computing  an overview
Service level agreement in cloud computing an overview
 

Similaire à Load balancing

Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Amazon Web Services
 
Distributed load balancing with multiple datacenter analysis
Distributed load balancing with multiple datacenter analysisDistributed load balancing with multiple datacenter analysis
Distributed load balancing with multiple datacenter analysis
Sowmya Shekar
 

Similaire à Load balancing (20)

Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
Architecting for the cloud scability-availability
Architecting for the cloud scability-availabilityArchitecting for the cloud scability-availability
Architecting for the cloud scability-availability
 
IT Resilience Technical
IT Resilience TechnicalIT Resilience Technical
IT Resilience Technical
 
Improve Customer Experience with Multi CDN Solution
Improve Customer Experience with Multi CDN SolutionImprove Customer Experience with Multi CDN Solution
Improve Customer Experience with Multi CDN Solution
 
unit3 part1.pptx
unit3 part1.pptxunit3 part1.pptx
unit3 part1.pptx
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
Cloud computing Module 2 First Part
Cloud computing Module 2 First PartCloud computing Module 2 First Part
Cloud computing Module 2 First Part
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
 
Cloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptxCloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptx
 
“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud
 
“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud“Spikey Workloads” Emergency Management in the Cloud
“Spikey Workloads” Emergency Management in the Cloud
 
Real time database
Real time databaseReal time database
Real time database
 
Testing the limits of cloud networks
Testing the limits of cloud networksTesting the limits of cloud networks
Testing the limits of cloud networks
 
Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)
 
My Dissertation 2016
My Dissertation 2016My Dissertation 2016
My Dissertation 2016
 
sla nptl.pptx
sla nptl.pptxsla nptl.pptx
sla nptl.pptx
 
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
 
Distributed load balancing with multiple datacenter analysis
Distributed load balancing with multiple datacenter analysisDistributed load balancing with multiple datacenter analysis
Distributed load balancing with multiple datacenter analysis
 

Plus de Soujanya V (7)

Decision tree
Decision treeDecision tree
Decision tree
 
Asymptotic analysis
Asymptotic analysisAsymptotic analysis
Asymptotic analysis
 
Implementing java server pages standard tag library v2
Implementing java server pages standard tag library v2Implementing java server pages standard tag library v2
Implementing java server pages standard tag library v2
 
Filter
FilterFilter
Filter
 
Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01
Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01
Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01
 
Implementing jsp tag extensions
Implementing jsp tag extensionsImplementing jsp tag extensions
Implementing jsp tag extensions
 
Filter
FilterFilter
Filter
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Load balancing

  • 2. Cloud Computing Broad network access Rapid Elasticity Pay as you go (Measured Service) On Demand
  • 5. Load Balancing (Distributed Environment) Improving Performance Redistribution of Load Better Response time Resource Sharing & utilization
  • 7. Load Balancing Virtual Machine Migration − Transfer virtual CPU,device states,memory data Trigger Strategy
  • 8. Algorithm  Trigger Migration if Cm >T  New Scenario − Sources (Ci close to CdiffMax) − Destination(Ci Close to CdiffMin)
  • 9. Throttled load balancing Ensured for predefined number of cloudlets Components : Load balancer Virtual machines Data center controller
  • 11. Throttled load balancing Data center controller Load balancer Finds VM Sends VM Id to DCC Assign request to VM Index table of VM & state of VM DCC notifies LB
  • 12. Trust and Reliability based Algorithm •Better distribution of load and improved QOS •Trust value that is calculated by the trust model on basis of different parameters are used to prioritize the datacenters and scheduling algorithms to make use of these trust values ie. To schedule the request based on trust values. •Based on trust value load balancing is done for better selection of node for better balancing of load. •In cloud Iaas, we use load balancing algo to distribute the load, better resource utilization and better QOS to the user. •Based on trust values of the domain resources are assigned to the user
  • 13. Trust based Algorithm •Trust model are used to calculate the trust values for datacenters based on the parameters which are as follows: 1. Initialization time : time taken to allocate resources requested and deploy them 2. Machine Instruction Per Second(MIPS) : Number of instructions completed per second 3. Fault rate: Number of faults in a period of time •Trust values are calculated for each datacenters •Updated after a fixed period of time
  • 14. Whole cycle – 1. Initialization- trust value of data center and client is initialized •data center is assigned the trust value on the basis of parameters and updated periodically •If the new data center is introduced, it is assigned with default trust value •All the parameters are initialized •Fault rate is initialized with default values for all datacenters
  • 15. 2. Load Balancing •Done using prioritized list of data centers and client trust •Listing of trusted and untrusted datacenters is done •Trusted node list consists of nodes having trust value greater than threshold value in decreasing order ie. The first node has the highest trust value •Untrusted node list consists of nodes having trust value lesser than threshold value in decreasing order
  • 16. Working •1. untrusted user •When node gets overloaded, VM with lowest trust value is migrated •Check selected VM is of public user or private user •If public, node to which VM is to be migrated is selected from untrusted list •2. trusted user
  • 17. 3. Trust Evolution •Updating datacentre trust value periodically after a fixed interval of time •Monitor behaviour of the datacentre on basis of fault rate and initialization time •Parameter value changes when load on data center increases/decreases •Let datacenters Di and attributes Ai1(initialization time), Ai2(MIPS), Ai3(Fault rate) and their corresponding trust value Ti •Value to be updated-
  • 18. Trust and Reliability Based Algorithm