Optimization of virtual machine placement based on constrained immune memory and immunodominance clone in IaaS cloud mode equipment training

Author(s):  
Zhijia Chen ◽  
Yuanchang Zhu ◽  
Yanqiang Di ◽  
Shaochong Feng

In infrastructure as a service (IaaS) cloud mode equipment simulated training, to keep the resource utilization ratio in a rational high level, improve the training effect and reduce the system running cost, the problem of training virtual machine (TVM) placement needs to be resolved first. We make analysis to the problem and give the mathematical formulation to the problem. Then, we figure out the principle and target of the TVM placement. Based on above analysis, we propose a constrained immune memory and immunodominance clone (CIMIC) TVM placement optimization algorithm. By reverse optimization of the initial antibody population, the searching range is reduced. The common antibody population and the immunodominance antibody population evolve simultaneously, which realizes the simultaneous progressing of global searching and local searching of solutions. Further, local optimal is avoided by this means. Memory antibody makes ful use of the unfeasible solutions and the diversity of antibody population is maintained. The constraint information of the problem is utilized to improve the optimization effect. Experiment results show that the CIMIC algorithm improves the overall optimization effect of TVM placement, reduces the server number and improves the resource utilization and system stability.

2018 ◽  
Vol 9 (4) ◽  
pp. 309-317
Author(s):  
Damodar Tiwari ◽  
Shailendra Singh ◽  
Sanjeev Sharma

1984 ◽  
Vol 1 (1) ◽  
pp. 15-25 ◽  
Author(s):  
Tim Johnson

The relentless growth of the computer industry over more than 30 years has been driven on by a series of major innovations. High-level languages; solid-state logic; compatible machine ranges; disk storage; time-sharing; data communications; virtual machine architectures; the use of LSI and solid-state memory; text processing; personal computers; sucessful packaged software; each advance in its turn has opened up new markets and set off a new spurt of expansion. A vital conclusion of this study is that expert systems promise to be another such major innovation.


2015 ◽  
Vol 20 (5) ◽  
pp. 556-566 ◽  
Author(s):  
Fan-Hsun Tseng ◽  
Chi-Yuan Chen ◽  
Li-Der Chou ◽  
Han-Chieh Chao ◽  
Jian-Wei Niu

2018 ◽  
Vol 6 (5) ◽  
pp. 340-345
Author(s):  
Rajat Pugaliya ◽  
Madhu B R

Cloud Computing is an emerging field in the IT industry. Cloud computing provides computing services over the Internet. Cloud Computing demand increasing drastically, which has enforced cloud service provider to ensure proper resource utilization with less cost and less energy consumption. In recent time various consolidation problems found in cloud computing like the task, VM, and server consolidation. These consolidation problems become challenging for resource utilization in cloud computing. We found in the literature review that there is a high level of coupling in resource utilization, cost, and energy consumption. The main challenge for cloud service provider is to maximize the resource utilization, reduce the cost and minimize the energy consumption. The dynamic task consolidation of virtual machines can be a way to solve the problem. This paper presents the comparative study of various task consolidation algorithms.


Author(s):  
Reza Rawassizadeh ◽  
Amin Anjomshoaa ◽  
A Min Tjoa

There are many mobile applications currently available on the market, which have been developed specifically for smart phones. The operating system of these smart phones is flexible enough to facilitate the high level application development. Similar to other pervasive devices, mobile phones suffer from limited amount of resources. These resources vary from the power (battery) consumption to the network bandwidth consumption. In this research the mobile resources are identified and classified. Furthermore, a monitoring approach to measure resource utilization is proposed. This monitoring tool generates traces about the resource usage which is followed by a benchmarking model which studies monitoring traces and enables users to extract qualitative information about the application from quantitative trace of resource usage.


Sign in / Sign up

Export Citation Format

Share Document