SlideShare a Scribd company logo
Load Balancing in
Cloud Computing
Cloud Computing
Broad network access
Rapid Elasticity
Pay as you go (Measured Service)
On Demand
Cloud Computing
SalesForc
e
Gmail
Goog
le
App
Engin
e
Virtualization
Cost Effectiveness
Operation efficiency
Heterogeneous Environment
Load Balancing (Distributed Environment)
Improving Performance
Redistribution of Load
Better Response time
Resource Sharing & utilization
Load Balancing
Load Balancing
Virtual Machine
Migration
− Transfer virtual
CPU,device
states,memory data
Trigger
Strategy
Algorithm

Trigger Migration if
Cm >T

New Scenario
− Sources (Ci close to CdiffMax)
− Destination(Ci Close to
CdiffMin)
Throttled load balancing
Ensured for predefined number of cloudlets
Components :
Load balancer
Virtual machines
Data center controller
Throttled load balancing
Throttled load balancing
Data center
controller
Load balancer
Finds VM
Sends VM Id to DCC
Assign request to VM
Index table of VM &
state of VM
DCC notifies LB
Trust and Reliability based Algorithm
•Better distribution of load and improved QOS
•Trust value that is calculated by the trust model on basis of different
parameters are used to prioritize the datacenters and scheduling algorithms
to make use of these trust values ie. To schedule the request based on trust
values.
•Based on trust value load balancing is done for better selection of node for
better balancing of load.
•In cloud Iaas, we use load balancing algo to distribute the load, better
resource utilization and better QOS to the user.
•Based on trust values of the domain resources are assigned to the user
Trust based Algorithm
•Trust model are used to calculate the trust values for datacenters based on
the parameters which are as follows:
1. Initialization time : time taken to allocate resources requested and
deploy them
2. Machine Instruction Per Second(MIPS) : Number of instructions
completed per second
3. Fault rate: Number of faults in a period of time
•Trust values are calculated for each datacenters
•Updated after a fixed period of time
Whole cycle –
1. Initialization- trust value of data center and client is initialized
•data center is assigned the trust value on the basis of parameters and
updated periodically
•If the new data center is introduced, it is assigned with default trust value
•All the parameters are initialized
•Fault rate is initialized with default values for all datacenters
2. Load Balancing
•Done using prioritized list of data centers and client trust
•Listing of trusted and untrusted datacenters is done
•Trusted node list consists of nodes having trust value greater than
threshold value in decreasing order ie. The first node has the highest trust
value
•Untrusted node list consists of nodes having trust value lesser than
threshold value in decreasing order
Working
•1. untrusted user
•When node gets overloaded, VM with lowest trust value is migrated
•Check selected VM is of public user or private user
•If public, node to which VM is to be migrated is selected from untrusted
list
•2. trusted user
3. Trust Evolution
•Updating datacentre trust value periodically after a fixed interval of time
•Monitor behaviour of the datacentre on basis of fault rate and initialization
time
•Parameter value changes when load on data center increases/decreases
•Let datacenters Di and attributes Ai1(initialization time), Ai2(MIPS),
Ai3(Fault rate) and their corresponding trust value Ti
•Value to be updated-
Trust and Reliability Based Algorithm
Thank you

More Related Content

PPTX
Load balancing in cloud
PPTX
Load Balancing in Cloud
PPTX
Load balancing in cloud computing.pptx
DOC
IOT Reference Model.doc
PPTX
Virtual private networks (vpn)
PPTX
Load balancing
Load balancing in cloud
Load Balancing in Cloud
Load balancing in cloud computing.pptx
IOT Reference Model.doc
Virtual private networks (vpn)
Load balancing

What's hot (20)

PPTX
Characteristics of cloud computing
PDF
Introduction to Software Defined Networking (SDN)
PPTX
2. Distributed Systems Hardware & Software concepts
PPTX
PPTX
Load balancing
PDF
Federated Cloud Computing - The OpenNebula Experience v1.0s
PPTX
Quality of Service
PPTX
Remote Procedure Call in Distributed System
PPT
Firewall Security Definition
PPTX
IPV6 ADDRESS
PPTX
Agent discovery& registration
PPT
Cluster Computing
PDF
IoT and m2m
PDF
Tutorial on IEEE 802.15.4e standard
PPTX
Transport layer security (tls)
PPT
WSN IN IOT
PPTX
Google App Engine
PPTX
MQTT IOT Protocol Introduction
PDF
Auto scaling using Amazon Web Services ( AWS )
PPTX
Scheduling in Cloud Computing
Characteristics of cloud computing
Introduction to Software Defined Networking (SDN)
2. Distributed Systems Hardware & Software concepts
Load balancing
Federated Cloud Computing - The OpenNebula Experience v1.0s
Quality of Service
Remote Procedure Call in Distributed System
Firewall Security Definition
IPV6 ADDRESS
Agent discovery& registration
Cluster Computing
IoT and m2m
Tutorial on IEEE 802.15.4e standard
Transport layer security (tls)
WSN IN IOT
Google App Engine
MQTT IOT Protocol Introduction
Auto scaling using Amazon Web Services ( AWS )
Scheduling in Cloud Computing
Ad

Similar to Load balancing (20)

PPTX
Trust and Cloud Computing, removing the need to trust your cloud provider
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PDF
Architecting for the cloud scability-availability
PPTX
IT Resilience Technical
PPTX
Improve Customer Experience with Multi CDN Solution
PPTX
ARCHITECTURAL_DESIGN_OF_COMPUTE_AND_STORAGE_CLOUDS[1] - Read-Only.pptx
PPTX
unit3 part1.pptx
PPT
PPTX
Cloud computing Module 2 First Part
PPTX
Probabilistic consolidation of virtual machines in self organizing cloud data...
PPTX
Cloudamize Platform Training for Azure.pptx
PPT
Real time database
PPTX
Testing the limits of cloud networks
PPT
Dynamic Load balancing Linux private Cloud (DRS)
PPTX
My Dissertation 2016
PPTX
sla nptl.pptx
PPTX
Distributed load balancing with multiple datacenter analysis
PPTX
CLOUD RESOURCE MANAGEMENT AND SCHEDULING
PPTX
Security as an Enabler – Cloud Security
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
Architecting for the cloud scability-availability
IT Resilience Technical
Improve Customer Experience with Multi CDN Solution
ARCHITECTURAL_DESIGN_OF_COMPUTE_AND_STORAGE_CLOUDS[1] - Read-Only.pptx
unit3 part1.pptx
Cloud computing Module 2 First Part
Probabilistic consolidation of virtual machines in self organizing cloud data...
Cloudamize Platform Training for Azure.pptx
Real time database
Testing the limits of cloud networks
Dynamic Load balancing Linux private Cloud (DRS)
My Dissertation 2016
sla nptl.pptx
Distributed load balancing with multiple datacenter analysis
CLOUD RESOURCE MANAGEMENT AND SCHEDULING
Security as an Enabler – Cloud Security
Ad

More from Soujanya V (7)

PPT
Decision tree
PPT
Asymptotic analysis
PPTX
Implementing java server pages standard tag library v2
PPTX
Filter
PPTX
Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01
PPTX
Implementing jsp tag extensions
PPTX
Filter
Decision tree
Asymptotic analysis
Implementing java server pages standard tag library v2
Filter
Bigdataissueschallengestoolsngoodpractices 141130054740-conversion-gate01
Implementing jsp tag extensions
Filter

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PDF
composite construction of structures.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
web development for engineering and engineering
PPTX
additive manufacturing of ss316l using mig welding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Geodesy 1.pptx...............................................
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Sustainable Sites - Green Building Construction
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
OOP with Java - Java Introduction (Basics)
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Model Code of Practice - Construction Work - 21102022 .pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
composite construction of structures.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT 4 Total Quality Management .pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Lecture Notes Electrical Wiring System Components
web development for engineering and engineering
additive manufacturing of ss316l using mig welding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Geodesy 1.pptx...............................................
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Sustainable Sites - Green Building Construction

Load balancing

  • 2. Cloud Computing Broad network access Rapid Elasticity Pay as you go (Measured Service) On Demand
  • 5. Load Balancing (Distributed Environment) Improving Performance Redistribution of Load Better Response time Resource Sharing & utilization
  • 7. Load Balancing Virtual Machine Migration − Transfer virtual CPU,device states,memory data Trigger Strategy
  • 8. Algorithm  Trigger Migration if Cm >T  New Scenario − Sources (Ci close to CdiffMax) − Destination(Ci Close to CdiffMin)
  • 9. Throttled load balancing Ensured for predefined number of cloudlets Components : Load balancer Virtual machines Data center controller
  • 11. Throttled load balancing Data center controller Load balancer Finds VM Sends VM Id to DCC Assign request to VM Index table of VM & state of VM DCC notifies LB
  • 12. Trust and Reliability based Algorithm •Better distribution of load and improved QOS •Trust value that is calculated by the trust model on basis of different parameters are used to prioritize the datacenters and scheduling algorithms to make use of these trust values ie. To schedule the request based on trust values. •Based on trust value load balancing is done for better selection of node for better balancing of load. •In cloud Iaas, we use load balancing algo to distribute the load, better resource utilization and better QOS to the user. •Based on trust values of the domain resources are assigned to the user
  • 13. Trust based Algorithm •Trust model are used to calculate the trust values for datacenters based on the parameters which are as follows: 1. Initialization time : time taken to allocate resources requested and deploy them 2. Machine Instruction Per Second(MIPS) : Number of instructions completed per second 3. Fault rate: Number of faults in a period of time •Trust values are calculated for each datacenters •Updated after a fixed period of time
  • 14. Whole cycle – 1. Initialization- trust value of data center and client is initialized •data center is assigned the trust value on the basis of parameters and updated periodically •If the new data center is introduced, it is assigned with default trust value •All the parameters are initialized •Fault rate is initialized with default values for all datacenters
  • 15. 2. Load Balancing •Done using prioritized list of data centers and client trust •Listing of trusted and untrusted datacenters is done •Trusted node list consists of nodes having trust value greater than threshold value in decreasing order ie. The first node has the highest trust value •Untrusted node list consists of nodes having trust value lesser than threshold value in decreasing order
  • 16. Working •1. untrusted user •When node gets overloaded, VM with lowest trust value is migrated •Check selected VM is of public user or private user •If public, node to which VM is to be migrated is selected from untrusted list •2. trusted user
  • 17. 3. Trust Evolution •Updating datacentre trust value periodically after a fixed interval of time •Monitor behaviour of the datacentre on basis of fault rate and initialization time •Parameter value changes when load on data center increases/decreases •Let datacenters Di and attributes Ai1(initialization time), Ai2(MIPS), Ai3(Fault rate) and their corresponding trust value Ti •Value to be updated-
  • 18. Trust and Reliability Based Algorithm