2018
DOI: 10.1109/jsyst.2016.2542251
|View full text |Cite
|
Sign up to set email alerts
|

A Multiqueue Interlacing Peak Scheduling Method Based on Tasks’ Classification in Cloud Computing

Abstract: Abstract-In cloud computing, resources are dynamic, and the demands placed on the resources allocated to a particular task are diverse. These factors could lead to load imbalances, which affect scheduling efficiency and resource utilization. A scheduling method called interlacing peak is proposed. First, the resource load information, such as CPU, I/O, and memory usage, is periodically collected and updated, and the task information regarding CPU, I/O, and memory is collected. Second, resources are sorted into… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 45 publications
(13 citation statements)
references
References 40 publications
0
13
0
Order By: Relevance
“…The simulator and generator were the open source software developed by the Pegasus group at the University of Southern California. The experimental results were compared with fuzzy clustering and two level based task scheduling (FCTLBS) [11], multi-queue interlacing peak scheduling method (MIPSM) [13], and least connection (LC) [18].…”
Section: Experiments and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulator and generator were the open source software developed by the Pegasus group at the University of Southern California. The experimental results were compared with fuzzy clustering and two level based task scheduling (FCTLBS) [11], multi-queue interlacing peak scheduling method (MIPSM) [13], and least connection (LC) [18].…”
Section: Experiments and Evaluationmentioning
confidence: 99%
“…(2) Heterogeneity of node resources and dynamic nature of load. When scheduling tasks of different types, the load size of resources such as CPU, memory, and I/O on the node resources at the current time needs to be considered [12,13]. Unreasonable task scheduling policy might lead to a load imbalance of resources, which not only…”
Section: Introductionmentioning
confidence: 99%
“…The biometric scheme was used to authenticate a user, and identity-based encryption scheme was used to encrypt and decrypt the data. Mechanisms proposed by Zuo et al 27,28 are very useful for scheduling the tasks by balancing the load and optimizing the performance, resource costs. With a large number of users, authentication mechanism using a single server will result in traffic bottlenecks and there will be a delay in scheduling them.…”
Section: Improving Our System Using Cloud Conceptmentioning
confidence: 99%
“…Using cloud, we can avoid this scenario by efficiently scheduling the jobs on multiple instances of a cloud. In another study, 27 authors proposed different scheduling mechanisms on the basis of task classifications and organizing the resources on the basis of the load. In another study, 28 a multiobjective optimization scheduling by considering both resource costs and performance of execution into account.…”
Section: Improving Our System Using Cloud Conceptmentioning
confidence: 99%
See 1 more Smart Citation