期刊文献+

云计算系统中能量有效的数据摆放算法和节点调度策略 被引量:9

Energy Efficient Data Placement Algorithm and Node-Scheduling Policies in Cloud Computing Systems
下载PDF
导出
摘要 云计算环境中数据中心能耗问题已经引起广泛关注,从绿色节能的角度考虑如何摆放云平台中的数据、如何调度云平台中的节点,成为非常重要的问题.现有的节点调度策略并不能在云计算平台环境中获得理想的节能效果.提出了一种启发式的动态数据摆放算法以及两种适用于云计算环境的节点调度优化策略.在保证任务请求满足预期执行效果的前提下,通过数据摆放算法和节点调度优化策略减少云平台消耗的能量.使用Cloudsim模拟了私有云环境,通过数据共享机制在资源池中进行数据块的动态摆放,开启最少的节点来覆盖最多的数据块,由此达到节能目的.将节点覆盖数据块的问题抽象为带权重的集合覆盖问题,使用贪心算法进行求解.通过实验测试了数据摆放方法和节点调度方法的节能效果,实验结果验证了数据摆放方法和节点调度方法的有效性. With the rise of cloud computing,it is important to save energy consumed by cloud systems.How to place data and how to schedule the nodes in the cloud platform has become a very important issue from the view of the energy-saving.However,existing node-scheduling policies can't save significant amount of energy for the cloud computing platforms.This paper proposes a heuristic data placement method and two node scheduling algorithms for cloud platforms to save energy with guaranteed service level.Cloudsim is adopted to simulate a private cloud system,where data block is dynamically placed in the resource pool by data sharing mechanism.Energy-saving effect is achieved by turning on minimum nodes to cover maximum data blocks.Especially,the problem of covering data block with computing nodes is abstracted as a set cover problem,and we use a greedy algorithm to solve this problem.This approach is practical to any cloud computing infrastructure.Finally,the data placement method and node scheduling algorithms proposed in this paper are verified by experiments.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第S1期342-351,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61173022)
关键词 云计算 数据摆放算法 节点调度策略 优化策略 能量有效性 cloud computing data placement algorithm node-scheduling policies optimization strategy energy efficiency
  • 相关文献

参考文献5

  • 1Anton Beloglazov,Jemal Abawajy,Rajkumar Buyya.Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing[J].Future Generation Computer Systems.2011(5)
  • 2Nitesh Maheshwari,Radheshyam Nanduri,Vasudeva Varma.Dynamic energy efficient data placement and cluster reconfiguration algorithm for MapReduce framework[J].Future Generation Computer Systems.2011(1)
  • 3Andreas Beckmann,Ulrich Meyer,Peter Sanders,Johannes Singler.Energy-efficient sorting using solid state disks[J].Sustainable Computing: Informatics and Systems.2011(2)
  • 4Willis Lang,Jignesh M. Patel,Jeffrey F. Naughton.On energy management, load balancing and replication[J].ACM SIGMOD Record.2010(4)
  • 5叶可江,吴朝晖,姜晓红,何钦铭.虚拟化云计算平台的能耗管理[J].计算机学报,2012,35(6):1262-1285. 被引量:179

二级参考文献5

共引文献178

同被引文献77

  • 1丁丁,罗四维,艾丽华.基于双向拍卖的适应性云计算资源分配机制[J].通信学报,2012,33(S1):132-140. 被引量:25
  • 2刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 3常潘,沈富可.使用域名负载均衡技术实现校园网对外服务器的高速访问[J].计算机应用,2007,27(7):1585-1586. 被引量:10
  • 4Leontiadis I,Marfia G,Mack D,et al.On the effectiveness of an opportunistic traffic management system for vehicular networks[J].IEEE Transactions on Intelligent Transportation Systems,2011,12(4):1537-1548.
  • 5Bauza R,Gozalvez J,Sanchez-Soriano J.Road traffic congestion detection through cooperative Vehicle-to-Vehicle oommunications[C].Int.Conf.Local Computer Networks (LCN),Denver,CO,2010:606-612.
  • 6Xia Ying,Zhang Xu,Wang Guo-yin.Ouster-based congestion outlier detection method on trajectory data[C].Int.Conf.Fuzzy Systems and Knowledge Discovery,Tianjin,2009:243-247.
  • 7Zhang En-zhan,Jiang Wei-li,Kuang Yu-jun,et al.Active RFID positioning of vehicles in road traffic[C].Int.Conf.Communications and Information Technologies (ISCIT),Hangzhou,2011:222-227.
  • 8SHEN Wei,WYNTER L.A New One-level Convex Optimization Approach for Estimating Origin-destination Demand[J].Transportation Research Part B:Methodological,2012,46(10):1535-1555.
  • 9SONMEZ 0,MOHAMED H,EPEMA D.On the benefit of processor coallocation in multicluster Grid systems[J].IEEE Transactions on Parallel and Distributed Systems,2010,21 (06):778-89.
  • 10Bimal K M,Gholam M A.Differential epidemic model of virus and worms in computer network[J].International Journal of Network Security,2012,14 (03):149-155.

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部