Accrual Based Scheduling for Cloud in Single and Multi Resource System: Study of Three Techniques

This paper evaluates the accrual based scheduling for cloud in single and multi-resource system. Numerous organizations benefit from Cloud computing by hosting their applications. The cloud model provides needed access to computing with potentially unlimited resources. Scheduling is tasks and resources mapping to a certain optimal goal principle. Scheduling, schedules tasks to virtual machines in accordance with adaptable time, in sequence under transaction logic constraints. A good scheduling algorithm improves CPU use, turnaround time, and throughput. In this paper, three realtime cloud services scheduling algorithm for single resources and multiple resources are investigated. Experimental results show Resource matching algorithm performance to be superior for both single and multi-resource scheduling when compared to benefit first scheduling, Migration, Checkpoint algorithms.




References:
[1] Salot, P. (2013). A survey of various scheduling algorithm in cloud
computing environment. International Journal of research and
engineering Technology (IJRET), ISSN, 2319-1163.
[2] Nikshape, S. S., & Deepak, S. S. Delivering Of Real Time Services
through Internet Protocol Using Cloud Computing.
[3] Jeffay, K., Stanat, D. F., & Martel, C. U. (1991, December). On nonpreemptive
scheduling of period and sporadic tasks. In Real-Time
Systems Symposium, 1991. Proceedings, Twelfth (pp. 129-139). IEEE.
[4] Jejurikar, R. (2005, July). Energy aware non-preemptive scheduling for
hard real-time systems. In Real-Time Systems, 2005.(ECRTS 2005).
Proceedings. 17th Euromicro Conference on (pp. 21-30). IEEE.
[5] http://www.personal.kent.edu/~rmuhamma/OpSystems/Myos/cpuSched
uling.htm
[6] Bouguerra, M. S., Kondo, D., & Trystram, D. (2011, May). On the
scheduling of checkpoints in desktop grids. In Cluster, Cloud and Grid
Computing (CCGrid), 2011 11th IEEE/ACM International Symposium
on (pp. 305-313). IEEE.
[7] Nguyen, D., & Thoai, N. (2012, May). Ebc: Application-level migration
on multi-site cloud. In Systems and Informatics (ICSAI), 2012
International Conference on (pp. 876-880). IEEE.
[8] Santhosh, R., & Ravichandran, T. (2013, February). Pre-emptive
scheduling of on-line real time services with task migration for cloud computing. In Pattern Recognition, Informatics and Mobile Engineering
(PRIME), 2013 International Conference on (pp. 271-276). IEEE.
[9] Huang, Q., Su, S., Xu, S., Li, J., Xu, P., & Shuang, K. (2013, July).
Migration-based elastic consolidation scheduling in cloud data center. In
Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE
33rd International Conference on (pp. 93-97). IEEE.
Ghribi, C., Hadji, M., & Zeghlache, D. (2013, May). Energy efficient
VM scheduling for cloud data centers: exact allocation and migration
algorithms. InCluster, Cloud and Grid Computing (CCGrid), 2013 13th
IEEE/ACM International Symposium on (pp. 671-678). IEEE.
[10] Melo, M., Araujo, J., Matos, R., Menezes, J., & Maciel, P. (2013,
October). Comparative Analysis of Migration-Based Rejuvenation
Schedules on Cloud Availability. In Systems, Man, and Cybernetics
(SMC), 2013 IEEE International Conference on (pp. 4110-4115). IEEE.
[11] Shamsinezhad, E., Shahbahrami, A., Hedayati, A., Zadeh, A. K., &
Banirostam, H. (2013). Presentation Methods for Task Migration in
Cloud Computing by Combination of Yu Router and Post-Copy.
[12] Santhosh, R., & Ravichandran, T. (2014). Task Scheduling for Online
Real Time Services with Multiple Resources Using RM Algorithm for
Cloud Computing. Australian Journal of Basic & Applied Sciences.
[13] PM, M. S., & Venkatesh, K. A New Optimal Checkpoint Restart Model.
[14] Sharma, R. (2012, August). Task Migration with EDF-RM Scheduling
Algorithms in Distributed System. In Advances in Computing and
Communications (ICACC), 2012 International Conference on (pp. 182-
185). IEEE.
[15] Singh, D., Singh, J., & Chhabra, A. (2012). Evaluating overheads of
integrated multilevel checkpointing algorithms in cloud computing
environment”. IJ Computer Network and Information Security, 5, 29-38.