Document not found! Please try again

Multiple Applications Sharing for Effective Load Balancing in Secured

4 downloads 0 Views 481KB Size Report
Distributed environment has primary advantages of high performance, availability, and extensibility at low cost. When load of running applications are more and ...
Available online at www.sciencedirect.com

ScienceDirect Procedia Computer Science 78 (2016) 763 – 770

,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\ 3ULYDF\ ,&,63 'HFHPEHU 1DJSXU,1',$

0XOWLSOH$SSOLFDWLRQV6KDULQJIRU(IIHFWLYH/RDG%DODQFLQJLQ 6HFXUHG'LVWULEXWHG(QYLURQPHQW .DYLWD.LPPDWNDUD8UPLOD6KUDZDQNDUE a

Research Scholar,Dept.of Computer Engineering, GHRCE,Nagpur,India,[email protected] b IEEE Member,Dept.of Computer Science & Engineering,GHRCE,Nagpur,India,[email protected]

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



© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license ‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 (http://creativecommons.org/licenses/by-nc-nd/4.0/). 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,&,63 Peer-review under responsibility of organizing committee of the ICISP2015 Keywords:'LVWULEXWHGHQYLURQPHQW%LQGLQJVHUYHU5HPRWH3URFHGXUH&DOO 53& 6KDULQJRIDSSOLFDWLRQV/RDGEDODQFLQJ

,QWURGXFWLRQ ,QDGLVWULEXWHGV\VWHPGLVWULEXWHGFRPSRQHQWVQHHGWRLQWHUDFWZLWKHDFKRWKHULQRUGHUWRH[FKDQJHGDWDRUWR DFFHVV HDFK RWKHU V VHUYLFHV LQ VHFXUHG PDQQHU >@>@ 0DQ\ PHWKRGRORJ\ DQG WHFKQLTXHV DUH DYDLODEOH IRU WKH FRPPXQLFDWLRQ LQ WKH GLVWULEXWHG HQYLURQPHQW  (YHQ WKHQ WKH GLVWULEXWHG HQYLURQPHQW KDV VRPH LVVXHV UHODWHG WR ORFDWLQJWKHVHUYLFHV$QLPEDODQFHGORDGGLVWULEXWLRQLQWKHGLVWULEXWHGHQYLURQPHQWUHGXFHVWKHSHUIRUPDQFHRIWKH V\VWHP>@7RLPSURYHWKHSHUIRUPDQFHRIGLVWULEXWHGHQYLURQPHQWLWLVHVVHQWLDOWRNHHSWKHV\VWHPORDGHTXDOIRU HDFKSURFHVVRU

1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of organizing committee of the ICISP2015 doi:10.1016/j.procs.2016.02.050

764

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

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

 )LJ%DVLF:RUNLQJ,GHD(TXDWLRQV

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

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

UHTXHVWHGFOLHQWWRRWKHUFOLHQWZKRKDVIHZHUORDGDQGDSSO\ORDGEDODQFLQJDOJRULWKPORDGEDODQFLQJDOJRULWKPLV H[SODLQHGLQVHFWLRQ 2.1. Load Balancing Algorithm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

     6HUYHUTXHXHPDQDJHPHQWLVGRQHE\IRUPXOD    DQG  ZKHUHLWFDOFXODWHWKHWLPHUHTXLUHGIRUSURFHVVLQJ WKHUHTXHVWIRUUHTXHVWHGFOLHQWVFKHGXOLQJWLPHWRSHUIRUPWDVNDQGGDWDSURFHVVLQJ                 2.4.1

Algorithm

&38/RDG0RQLWRULQJ ,I &L>T>W@@ UHTXHVW  ^  ,I&L>T>GDWD@&387LPH!7KUHVKROG  ^  6HUYHUT>W@ VFK>UT>W@@ &L>T>W@@ VFK>T>W@@ 8SGDWHBSUREBORDGGLIIHUHQFH &L>W@B&38B7LPH &L>T>W@@3URFHVVLQJ7LPH  6FK>T>GDWD@@5HVSRQVH7LPH LI &L>W@&387LPH!7KUHVKROG 

765

766

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

^    ` HOVH ^     

6HUYHUUHTXHVW UHTXHVW 6HUYHU6FDQ T>UHT@W 6HUYHUWUDQVIHUUHTXHVWWRQHZFOLHQW

3URFHVVFRPSOHWH T>UHTW\SH@ FRPSOHWH &38B7LPHXSGDWH /RDGBGLII &38B7LPH ```

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¶VTXHXHOHQJWKEHKDYLRURYHUWLPHDQGQRRISDFNHWSURFHVVHGLQWKDWWLPH WRJHWKHU ZLWK WKH DYHUDJH YDOXH DPRQJ DOO FOLHQWV )LJ  VKRZV TXHXH OHQJWK EHKDYLRU RI FOLHQWV ZKHQ GLIIHUHQW DOJRULWKPVDUHDSSOLHG,WVKRZVWKHTXHXHVL]HXVHGE\FOLHQWGXULQJWKHSURFHVVLQJRISDFNHW       

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

767

                             

D 



        E    )LJ4XHXH/HQJWK%HKDYLRXU D 1HZ$SSURDFK E &HQWUDO4XHXH   &38XWLOL]DWLRQDIWHUORDGEDODQFLQJIRUDOOWKHFOLHQWVE\GLIIHUHQWORDGEDODQFLQJDOJRULWKPVLVVKRZQLQILJ ,WZDVFDOFXODWHGDVQXPEHURISDFNHWSURFHVVHGDQG&38XVDJHVWRSURFHVVWKDWSDFNHW       

768

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

                              

D 

       E    )LJ&388WLOL]DWLRQRIFOLHQWVDIWHUORDGEDODQFLQJ D 1HZ$SSURDFK E &HQWUDO4XHXH   7KLVZRUNDOVRFKHFNVWKHUHVSRQVHWLPHRIFOLHQWVDIWHUDSSO\LQJWKH&HQWUDOTXHXHDQG1HZ$SSURDFK5HVSRQVH WLPHIRUDOOWKHIRXUFOLHQWVE\GLIIHUHQWDOJRULWKPVDUHVKRZQLQILJ       

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

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



3DUDPHWHU

1HZ$SSURDFK

&HQWUDO4XHXH

4XHXH6L]H Q 





&388WLOL]DWLRQDIWHUORDGEDODQFLQJ  





5HVSRQVH7LPH V 





769

770

Kavita Kimmatkar and Urmila Shrawankar / Procedia Computer Science 78 (2016) 763 – 770

&RQFOXVLRQ 7KHDOJRULWKPSUHVHQWHGLQWKLVSDSHUXVHVTXHXHPDQDJHPHQWPHFKDQLVP,QZKLFKLWXVHVWKHVHSDUDWHTXHXHIRU GDWDDQGUHTXHVW'XHWRWKHXVHRIVHSDUDWHTXHXHUHVSRQVHWLPHLVUHGXFHG$VUHTXHVWTXHXHSURFHVVWKHUHTXHVW DQGGDWDTXHXHSURFHVVWKHGDWDVRUHTXLUHGTXHXHVL]HLVPLQLPXPDQGUHTXLUHGSURFHVVLQJWLPHLVDOVRPLQLPXP 7KURXJKWKHYDULRXVFRPSDULQJUHVXOWVDVVKRZQLQ7DEOHLWVKRZVWKDWWKHSHUIRUPDQFHRIWKHSURSRVHGVFKHPHLV EHWWHUWKDQWKDWRIWKHROGVFKHPHRQWKHEDVLVRIUHVSRQVHWLPHTXHXHVL]HEHKDYLRUDQG&38XWLOL]DWLRQ 5HIHUHQFHV 

0D\XUL$0HKWD'HYHVK&-LQZDOD$QDO\VLVRI6LJQLILFDQW&RPSRQHQWVIRU'HVLJQLQJDQ(IIHFWLYH'\QDPLF/RDG%DODQFLQJ$OJRULWKP LQ'LVWULEXWHG6\VWHPVThird International Conference on Intelligent Systems Modelling and SimulationSS  )DZD] $ 0 0DVRXG 4DWDZQHK 0RKDPPDG :HVDP $OPREDLGHHQ,QWHUDFWLYH 53& %LQGLQJ 0RGHO European Journal of Scientific Research,9RO1RSS  .DYLWD.LPPDWNDU8UPLOD6KUDZDQNDU$SSOLFDWLRQV6KDULQJXVLQJ%LQGLQJ6HUYHUIRU'LVWULEXWHG(QYLURQPHQW”.International Journal of Computer Science,VVXHV9RO,VVXH1RSS