SlideShare uma empresa Scribd logo
1 de 83
Resource
Management
Introduction

• A resource can be logical, such as a
  shared file or physical such as CPU.

• The set of available resources in a
  distributed system acts like a single
  virtual system.
Cont…
• Resource manager:
  – Controls the assignment of resources to
    processes.
  – Routes the processes to suitable nodes of
    the system in such a manner that resource
    usage, response time, network congestion,
    and scheduling overhead are optimized.
Techniques

Task assignment approach:
• Each process submitted by a user for
  processing is viewed as a collection of
  related tasks.

• Tasks are scheduled to suitable nodes to
  improve performance.
Cont…
Load-balancing approach:
• All the processes submitted by the users are
  distributed among the nodes of the system.

• Equalizes the workload among the nodes.
Cont…
Load-sharing approach:
• Attempts to conserve the ability of the
  system, assuring that no node is idle while
  processes wait for being processed.
Desirable features of a good
         Scheduling Algorithms
•   No a priori knowledge about the processes.
•   Dynamic in nature.
•   Quick decision-making capability.
•   Balanced system performance.
•   Stability.
•   Scalability.
•   Fault tolerance.
•   Fairness of service.
Task assignment approach
• A process is considered to be composed
  of multiple task.

• Goal is to find an optimal assignment
  policy for the task of an individual
  process.
Cont…
Assumptions:
 1. A process has already been split into
   pieces called tasks.
 2. Amount of computation required by each
   task and speed of each processor are
   known.
 3. The cost of processing each task on
   every node of the system is known.
 4. The IPC costs between every pair of task
   is known.
Cont…
5. Other constraints, like Resource
  requirements of the tasks and the
  available resources at each node are
  also known.

6. Reassignment of the tasks is generally
  not possible.
Cont…

• Goals:
   Minimization of IPC costs
   Quick turnaround time for the complete process
   A high degree of parallelism
   Efficient utilization of system resources in general


• These goals often conflict with each other.
Cont…
• Two task assignment parameters
  – Task execution cost and

  – Inter-task communication cost
Cont…: Example
• Total tasks = 6

• Total nodes = 2
Cont…

Inter task communications cost          Execution costs
      t1   t2   t3   t4   t5     t6   Task           Nodes
 t1    0   6    4    0    0      12            n1       n2
t2     6   0    8    12   3      0     t1      5        10
t3     4   8    0    0    11     0     t2      2          ∞
                                       t3       4         4
t4     0   12   0    0    5      0
                                       t4       6         3
t5     0   3    11   5    0      0
                                       t5       5         2
t6    12   0    0    0    0      0     t6      ∞          4
Cont…
Serial assignment   Optimal assignment
Task        Node       Task     Node

 t1          n1        t1        n1

 t2          n1        t2        n1

 t3          n1        t3        n1

 t4          n2        t4        n1

 t5          n2        t5        n1

 t6          n2        t6        n2
Cont…
Serial assignment execution cost (x)
         = x11+x21+x31+x42+x52+x62
          = 5+2+4+3+2+4 = 20

Serial assignment communication cost (c)
  = c14+c15+c16+c24+c25+c26+c34+c35+c36
  = 0+0+12+12+3+0+0+11+0 = 38

Total Serial assignment cost
      = x + c = 20 + 38 = 58
Cont…
Optimal assignment execution cost (x)
     = x11+x21+x31+x41+x51+x62
     = 5+2+4+6+5+4 = 26

Optimal assignment communication cost (c)
     = c16+c26+c36+c46+c56
     = 12+0+0+0+0 = 12

Total Optimal assignment cost
      = x + c = 26 +12 = 38
Load balancing approach
• Load balancing Algorithms are also known as
  load-leveling algorithms.
  – Based on the intuition of better resource utilization.

• Algorithm tries to balance the total system load
  by transparently transferring the workload from
  heavily loaded nodes to lightly loaded nodes.

• Goal: maximize the total system throughput.
Taxonomy of load balancing
Static vs. Dynamic

• Static algorithms:
  • Use only information about the average
    behavior of the system, ignoring the current
    state of the system.

  • Simpler because no need to maintain and
    process system state information.

  • Do not react to the current system state.
Cont…
• Dynamic algorithms:
  • React to the system state that changes
    dynamically.

  • Able to avoid those state with unnecessarily
    poor performance.

  • More complex than static algorithms.
Deterministic vs. Probabilistic

• Both are Static load balancing algorithms.

• Deterministic algorithms:
  – Use the information about the properties of
    the node and characteristics of the processes.

  – Difficult to   optimize   and   cost   more   to
    implement.
Cont…
• Probabilistic algorithms:
  – Use information regarding static attributes of
    the system.

  – Easier to implement.

  – Suffer from having poor performance.
Centralized vs. Distributed
• Centralized algorithm:
  – The responsibility of scheduling       physically
    resides on a single node.

  – System state information is collected at a single
    node at which all the scheduling decisions are
    made.
     • Known as Centralized server node.
Cont…
– Problem : reliability
   • If the centralized server fails, all scheduling in the
     system would cease.

– Solution : replicate the server on K+1 nodes if it
  is to survive k faults.
Cont…

• Distributed algorithms:
  – The work involved in making process assignment
    decisions is physically distributed among the
    various nodes of the system.

  – Avoids the bottleneck of        collecting   state
    information at a single node.

  – Allows the scheduler to react quickly to dynamic
    changes in the state.
Cont…


– Algorithm is composed of entities known as local
  controllers.

– Each entity is responsible for making scheduling
  decisions for the processes of its own node.
Co-operative vs. Non-Cooperative
•        Non-cooperative algorithms :
     •     Individual entities act as autonomous entities
           and make scheduling decisions independently of
           the actions of other entities.
Cont…
• Cooperative algorithms:
  • Distributed entities cooperate with each other to
    make scheduling decisions.

  • More complex and involve larger overhead than
    non-cooperative.
Issues in designing load
           balancing algorithms
•   Load estimation policy
•   Process transfer policy
•   State information exchange policy
•   Location policy
•   Priority assignment policy
•   Migration limiting policy
Cont…
• Local Process
  – A process which is processed at its
    originated node.


• Remote Process
  – A process which is processed at a node
    different than the one on which it
    originated.
Load Estimation Policies

• Estimation based on parameters like:
  1. Total no. of processes on the node at the
    time of load estimation.

  2. Resource demands of these processes.

  3. Instruction mixes of these processes.

  4. Architecture and speed of the node’s
    processor.
Cont…
• Sum of the remaining service times of
  all the processes on a node can be a
  measure for estimating a node’s
  workload.

• Issue: how to estimate the remaining
  service time of the processes?
Cont…
•   Solutions:
    1. Memoryless method
      •   This method assumes that all processes have
          the same expected remaining service time,
          independent of the time used so far.

      •   It reduces the load estimation method to that
          of total number of processes.
Cont…
2.Pastrepeats
  •   This method assumes that the remaining
      service time of a process is equal to the time
      used so far by it.


3.Distribution method
  •   If the distribution of service times is known,
      the associated process’s remaining service
      time is the expected remaining time
      conditioned by the time already used.
Process Transfer Policies
• Load balancing algorithms use the threshold
  policy to decide whether a node is lightly or
  heavily loaded.

• The threshold value of a node:
  – the limiting value of its workload,
  – used to decide whether a node is lightly or heavily
    loaded.
Cont…
•    Methods to determine the threshold
     value of a node:

    1. Static policy
       •   Each node has a predefined threshold value
           depending on its processing capability.
       •   This value does not vary with the dynamic
           changes in workload at local or remote nodes.
       •   No exchange of state information among the
           nodes to decide this value.
Cont…
2. Dynamic policy
   • The threshold value of a node is calculated as a
     product of the average workload of all the nodes
     and a predefined constant (ci).

   • Nodes exchange state information by using one of
     the state information exchange policies.

   • It gives a more realistic value of threshold for each
     node.

   • Involves overhead in exchange of state information.
Cont…
• Most load balancing algorithms uses a single
  threshold and thus only have overloaded and
  under loaded regions.
Load regions
Cont… : Single-threshold policy
• A node accepts new processes (either local or
  remote) based on its load.
  – Accepts if load is below the threshold value.

  – Rejects if load is above the threshold value.


• It makes scheduling algorithms unstable.
Cont…
– A node should only transfer one or more of its
  processes to another node if such transfers
  greatly improves the performance of the rest of
  its local processes.

– A node should accept remote processes if its
  load is such that the added workload of
  processing these incoming processes does not
  significantly affect the service to the local ones.
Cont… : Double-threshold policy

• Also known as high-low policy.

• Use of two threshold values: high mark
  and low mark.

• Three regions :
  – Overloaded
  – Normal
  – Under loaded
Cont…
• For overloaded region:
  – New local processes are sent to be run
    remotely and requests to accept remote
    processes are rejected.


• For normal region:
  – New local processes run locally and
    requests to accept remote processes are
    rejected.
Cont…

• For underloaded region:
  – New local processes run locally and
    requests to accept remote processes are
    accepted.
Location policies

1.   Threshold
2.   Shortest
3.   Bidding
4.   Pairing
Cont… : Threshold
• A destination node is selected at random.

• A check is made to determine
  – whether the transfer of the process to that
    node would place it in a state that prohibits
    the node to accept remote processes.

  – If not, the process is transferred to the
    selected node, which must execute the
    process regardless of its state when the
    process actually arrives.
Cont…
• If the check indicates that the selected node is
  in a state that prohibits it to accept remote
  processes, another node is selected at random
  and probed in the same manner.

• A static probe limit LP is used here.

• The performance with a small probe limit (e.g.
  3 or 5) is almost as good as the performance
  with a large probe limit (e.g. 20).
Cont… : Shortest
• LP distinct nodes are chosen at random and
  each is polled in turn to determine its load.

• The process is transferred to the node having
  the minimum load value, unless that node’s
  load is such that it prohibits the node to
  accept remote processes.
Cont…
• If none of the polled node can accept the
  process, it is executed at its originating node.

• Discontinue probing whenever a node with
  zero load is encountered.
Cont… : Bidding
• Each node in the network is responsible for
  two roles : manager and contractor.

• The Manager represents a node having a
  process in need of a location to execute.

• The Contractor represents a node that is able
  to accept remote processes.
Cont…
• To select a node for its processes, a manager
  broadcasts a request-for-bids message to all
  other nodes in the system.

• The contractors return bids to the manager
  node.

• Manager transfers the process to the node
  with best bid.
Cont…
• Problem:
  – A contractor may win many bids from many
    other manager nodes and thus becomes
    overloaded.


• Solution:
  – On choosing best bid, manager node may
    send a message to the owner of that bid
    and send process on acknowledgement.
Cont…
• Both manager and contractor are free
  to take decisions.

• Drawback of bidding policy:
  – Communication overhead
  – Difficult to decide a good pricing policy.
Cont… : Pairing
• This policy reduces the variance of loads only
  between pairs of nodes of the system.

• Two nodes that differ greatly in load are
  temporarily paired with each other.

• The load-balancing operation is carried out
  between the nodes belonging to the same
  pair.
Cont…
• A node only tries to find a partner if it has at
  least two processes; otherwise migration from
  this node is never reasonable.

• Use of random selection of pair.

• The pair is broken as soon as the process
  migration is over.
State information exchange
               policies

1.   Periodic broadcast
2.   Broadcast when state changes
3.   On- demand exchange
4.   Exchange by polling
Cont…: Periodic broadcast
• Each node broadcasts its state information
  after the elapse of every t units of time.

• Generates heavy traffic.

• Possibility of   fruitless   messages   being
  broadcast.

• Poor scalability problem.
Cont…: Broadcast when state
            changes

• A node broadcasts its state information
  only when its state changes.
  – When a process arrives at that node or
    when a process departs from that node.

  – When its state switches from the normal
    load region to either the underloaded
    region or the overloaded region.
    • Works with two-threshold transfer policy.
Cont…: On- demand exchange
• A node broadcasts a StateInformationRequest
  message when its state switches from the
  normal load region to either the underloaded
  region or the overloaded region.

• Receiving nodes send their current state to the
  requesting node.

• Policy works with two-threshold transfer policy.
Cont…
• The status of the requesting node is included
  in the StateInformationRequest message.

• If this status is
   – Underloaded, only overloaded nodes will
      respond to it.

  – Overloaded, only underloaded nodes will
    respond to it.
Cont…: Exchange by polling
• No need for a node to exchange its state
  information with all other nodes in the system.

• When a node needs the cooperation of some
  other node for load balancing, it can search
  for a suitable partner by randomly polling the
  other nodes one by one.
Priority Assignment Policies


1. Selfish
2. Altruistic
3. Intermediate
Cont…
• Selfish:
  – Local processes are given higher priority
    than remote processes.

  – Yields   the  worst    response              time
    performance among other policies.
     • Poor performance of remote processes.

     • Best response time for local processes.
Cont…
• Altruistic:
  – Remote processes are given higher priority
    than local processes.

  – Policy has best response time of the three
    policies.
Cont…
• Intermediate:
   – The priority of processes depends on the
     number of local processes and the number
     of remote processes at the concerned
     node.
   – If no. of local nodes is greater than or
     equal to the no. of remote processes,
     priority will be given to local processes
     otherwise to remote processes.
   – Overall response time performance is
     much closer to that of the altruistic policy.
Migration- limiting policies

• A decision about the total no. of times a
  process should be allowed to migrate.

• Two migration-limiting policies:
  – Uncontrolled
  – Controlled
Cont…

• Uncontrolled
  – A remote process arriving at a node is treated just
    as a process originating at the node.
  – A process may be migrated any no of times.
Cont…
• Controlled
  – To overcome the instability problem of the
    uncontrolled policy, most system treat remote
    processes different from local processes and
    use a migration count parameter.
Load sharing approach
• For the proper utilization of the resources of
  a distributed system it is not required to
  balance the load on all the nodes.

• It is necessary and sufficient to prevent the
  nodes from being idle while some other
  node have more than two processes.
Cont…
• This rectification is often called dynamic load
  sharing instead of dynamic load balancing.
Issues in designing load-sharing
            algorithms

• Load sharing algorithms do not attempt to balance the
  average workload on all the nodes of the system,
  rather they only attempt to ensure that no node is idle
  when a node is heavily loaded.

• The priority assignment policies and migration limiting
  policies are same as that for the load-balancing
  algorithms. Other policies are described here.
Cont… : Load Estimation Policy

• It is sufficient to know whether a node is busy
  or idle.

• Methods for estimating load:
  – Count the total number of processes on a node.
  – Measure CPU utilization.
Cont… : Process transfer policies
• All-or-nothing strategy:
  – Uses the single threshold policy with the threshold
    value of all the node fixed at 1 and some uses 2.

  – Drawback : Loss of available processing power in
    the system.

  – Solution : use a threshold value of 2 instead of 1.
Location policies

1. Sender-initiated policy
2. Receiver-initiated policy
Sender initiated location policy
• Heavily loaded nodes search for lightly loaded
  node to which work may be transferred.

• When load becomes more than the threshold
  value, it either broadcasts a message or randomly
  probes the other nodes one by one to find a lightly
  loaded node.
Cont…
• In the broadcasting method, the presence or
  absence of a suitable receiver node is known as
  soon as the sender node receives reply messages
  from the other nodes.
Cont…

• In the random probing method, the probing
  continues until either a suitable node is found or
  the no. of probes reaches a static probe limit, Lp.

• Fixed limit has better scalability than broadcast
  method.
Receiver-initiated location policy
• Lightly loaded node search for heavily loaded nodes
  from which work may be transferred.

• When a node’s load falls below the threshold value
  either it broadcasts a message indicating its
  willingness to receive processes or randomly probes
  the other nodes one by one to find a heavily loaded
  node.

•    In the broadcast method, a suitable node is found as
    soon as the receiver node receives reply messages
    from the other nodes.
Cont…
• In the random probing method, the probing
  continues until either a suitable node is found
  or the no. of probes reaches a static probe
  limit, Lp.
Cont…
• Both sender-initiated and receiver-initiated
  policies   offer    substantial performance
  advantages over the situation in which no
  load sharing is attempted.

• Sender-initiated policies are preferable at
  light to moderate system loads, while
  receiver-initiated policies are preferable at
  high system loads.
Cont…
• If the cost of process transfer under receiver-
  initiated policies is significantly greater than
  under the sender-initiated policies due to the
  preemptive transfer of processes, sender-
  initiated policies provide uniformly better
  performance.
State information Exchange Policy

1. Broadcast when state changes.
2. Poll when state changes.

Mais conteúdo relacionado

Mais procurados

Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote InvocationMedicaps University
 
Remote Procedure Call (RPC) Server creation semantics & call semantics
Remote Procedure Call (RPC) Server creation semantics & call semanticsRemote Procedure Call (RPC) Server creation semantics & call semantics
Remote Procedure Call (RPC) Server creation semantics & call semanticssvm
 
Synchronization - Election Algorithms
Synchronization  - Election AlgorithmsSynchronization  - Election Algorithms
Synchronization - Election AlgorithmsOsaMa Hasan
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
Distributed System Management
Distributed System ManagementDistributed System Management
Distributed System ManagementIbrahim Amer
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)Sri Prasanna
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemorySHIKHA GAUTAM
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computingSVijaylakshmi
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemDHIVYADEVAKI
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replicationAbDul ThaYyal
 

Mais procurados (20)

Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
 
Remote Procedure Call (RPC) Server creation semantics & call semantics
Remote Procedure Call (RPC) Server creation semantics & call semanticsRemote Procedure Call (RPC) Server creation semantics & call semantics
Remote Procedure Call (RPC) Server creation semantics & call semantics
 
Synchronization - Election Algorithms
Synchronization  - Election AlgorithmsSynchronization  - Election Algorithms
Synchronization - Election Algorithms
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Resource management
Resource managementResource management
Resource management
 
File replication
File replicationFile replication
File replication
 
Distributed System Management
Distributed System ManagementDistributed System Management
Distributed System Management
 
Synch
SynchSynch
Synch
 
Group Communication (Distributed computing)
Group Communication (Distributed computing)Group Communication (Distributed computing)
Group Communication (Distributed computing)
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Synchronization in distributed computing
Synchronization in distributed computingSynchronization in distributed computing
Synchronization in distributed computing
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
 
12. dfs
12. dfs12. dfs
12. dfs
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
 

Destaque

Load balancing in Distributed Systems
Load balancing in Distributed SystemsLoad balancing in Distributed Systems
Load balancing in Distributed SystemsRicha Singh
 
Process management
Process managementProcess management
Process managementMohd Arif
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K SinhaJawwad Rafiq
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systemskaran2190
 
Load Balancing In Distributed Computing
Load Balancing In Distributed ComputingLoad Balancing In Distributed Computing
Load Balancing In Distributed ComputingRicha Singh
 
Process management in os
Process management in osProcess management in os
Process management in osMiong Lazaro
 
Operating Systems and Memory Management
Operating Systems and Memory ManagementOperating Systems and Memory Management
Operating Systems and Memory Managementguest1415ae65
 
Load Balancing
Load BalancingLoad Balancing
Load Balancingnashniv
 
Management process powerpoint
Management process powerpointManagement process powerpoint
Management process powerpointElizabethLampson2
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
Cs704 d distributedschedulingetc.
Cs704 d distributedschedulingetc.Cs704 d distributedschedulingetc.
Cs704 d distributedschedulingetc.Debasis Das
 
16.Distributed System Structure
16.Distributed System Structure16.Distributed System Structure
16.Distributed System StructureSenthil Kanth
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 

Destaque (20)

Load balancing in Distributed Systems
Load balancing in Distributed SystemsLoad balancing in Distributed Systems
Load balancing in Distributed Systems
 
10. resource management
10. resource management10. resource management
10. resource management
 
Process management
Process managementProcess management
Process management
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K Sinha
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
Load Balancing In Distributed Computing
Load Balancing In Distributed ComputingLoad Balancing In Distributed Computing
Load Balancing In Distributed Computing
 
Process management in os
Process management in osProcess management in os
Process management in os
 
Operating Systems and Memory Management
Operating Systems and Memory ManagementOperating Systems and Memory Management
Operating Systems and Memory Management
 
Load Balancing
Load BalancingLoad Balancing
Load Balancing
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Distributed System
Distributed System Distributed System
Distributed System
 
Management process powerpoint
Management process powerpointManagement process powerpoint
Management process powerpoint
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
Cs704 d distributedschedulingetc.
Cs704 d distributedschedulingetc.Cs704 d distributedschedulingetc.
Cs704 d distributedschedulingetc.
 
16.Distributed System Structure
16.Distributed System Structure16.Distributed System Structure
16.Distributed System Structure
 
Name services
Name servicesName services
Name services
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Input and Output Control
Input and Output ControlInput and Output Control
Input and Output Control
 

Semelhante a resource management

Resource management original
Resource management originalResource management original
Resource management originalUsman Namadi
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity securityLen Bass
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxSyed Zaid Irshad
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.pptvishal choudhary
 
Lec 4 (program and network properties)
Lec 4 (program and network properties)Lec 4 (program and network properties)
Lec 4 (program and network properties)Sudarshan Mondal
 
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...morganjohn3
 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesNECST Lab @ Politecnico di Milano
 
(Slides) Task scheduling algorithm for multicore processor system for minimiz...
(Slides) Task scheduling algorithm for multicore processor system for minimiz...(Slides) Task scheduling algorithm for multicore processor system for minimiz...
(Slides) Task scheduling algorithm for multicore processor system for minimiz...Naoki Shibata
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed SystemsRitu Ranjan Shrivastwa
 
Data structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdfData structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdfDukeCalvin
 
SecondPresentationDesigning_Parallel_Programs.ppt
SecondPresentationDesigning_Parallel_Programs.pptSecondPresentationDesigning_Parallel_Programs.ppt
SecondPresentationDesigning_Parallel_Programs.pptRubenGabrielHernande
 
Lecture 5- Process Synchronization (1).pptx
Lecture 5- Process Synchronization (1).pptxLecture 5- Process Synchronization (1).pptx
Lecture 5- Process Synchronization (1).pptxAmanuelmergia
 
A Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing CloudsA Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing Cloudsijsrd.com
 
ADS Introduction
ADS IntroductionADS Introduction
ADS IntroductionNagendraK18
 

Semelhante a resource management (20)

Resource management original
Resource management originalResource management original
Resource management original
 
Resource management
Resource managementResource management
Resource management
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
 
Design and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptxDesign and Analysis of Algorithms.pptx
Design and Analysis of Algorithms.pptx
 
SE-coupling and cohesion.ppt
SE-coupling and cohesion.pptSE-coupling and cohesion.ppt
SE-coupling and cohesion.ppt
 
Unit-3.ppt
Unit-3.pptUnit-3.ppt
Unit-3.ppt
 
Chapter00000000
Chapter00000000Chapter00000000
Chapter00000000
 
Lec 4 (program and network properties)
Lec 4 (program and network properties)Lec 4 (program and network properties)
Lec 4 (program and network properties)
 
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
Module 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModule 2 - PPT.pdfModul...
 
Self-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policiesSelf-adaptive container monitoring with performance-aware Load-Shedding policies
Self-adaptive container monitoring with performance-aware Load-Shedding policies
 
(Slides) Task scheduling algorithm for multicore processor system for minimiz...
(Slides) Task scheduling algorithm for multicore processor system for minimiz...(Slides) Task scheduling algorithm for multicore processor system for minimiz...
(Slides) Task scheduling algorithm for multicore processor system for minimiz...
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
Data structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdfData structures and algorithms Module-1.pdf
Data structures and algorithms Module-1.pdf
 
Transactions
TransactionsTransactions
Transactions
 
Lecture 5 inter process communication
Lecture 5 inter process communicationLecture 5 inter process communication
Lecture 5 inter process communication
 
Cs 331 Data Structures
Cs 331 Data StructuresCs 331 Data Structures
Cs 331 Data Structures
 
SecondPresentationDesigning_Parallel_Programs.ppt
SecondPresentationDesigning_Parallel_Programs.pptSecondPresentationDesigning_Parallel_Programs.ppt
SecondPresentationDesigning_Parallel_Programs.ppt
 
Lecture 5- Process Synchronization (1).pptx
Lecture 5- Process Synchronization (1).pptxLecture 5- Process Synchronization (1).pptx
Lecture 5- Process Synchronization (1).pptx
 
A Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing CloudsA Framework for Performance Analysis of Computing Clouds
A Framework for Performance Analysis of Computing Clouds
 
ADS Introduction
ADS IntroductionADS Introduction
ADS Introduction
 

Mais de Ashish Kumar

Computer architecture
Computer architecture Computer architecture
Computer architecture Ashish Kumar
 
Introduction vision
Introduction visionIntroduction vision
Introduction visionAshish Kumar
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restorationAshish Kumar
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domainAshish Kumar
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domainAshish Kumar
 
Digitized images and
Digitized images andDigitized images and
Digitized images andAshish Kumar
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processingAshish Kumar
 
video compression techique
video compression techiquevideo compression techique
video compression techiqueAshish Kumar
 

Mais de Ashish Kumar (20)

Computer architecture
Computer architecture Computer architecture
Computer architecture
 
Lecture2 color
Lecture2 colorLecture2 color
Lecture2 color
 
Introduction vision
Introduction visionIntroduction vision
Introduction vision
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
Image pre processing-restoration
Image pre processing-restorationImage pre processing-restoration
Image pre processing-restoration
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Enhancement in frequency domain
Enhancement in frequency domainEnhancement in frequency domain
Enhancement in frequency domain
 
Digitized images and
Digitized images andDigitized images and
Digitized images and
 
Data structures
Data structuresData structures
Data structures
 
Lecture2 light
Lecture2 lightLecture2 light
Lecture2 light
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
message passing
 message passing message passing
message passing
 
color
colorcolor
color
 
Introduction image processing
Introduction image processingIntroduction image processing
Introduction image processing
 
system design
system designsystem design
system design
 
video compression techique
video compression techiquevideo compression techique
video compression techique
 
Compression
CompressionCompression
Compression
 
1.animation
1.animation1.animation
1.animation
 

Último

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Último (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

resource management

  • 2. Introduction • A resource can be logical, such as a shared file or physical such as CPU. • The set of available resources in a distributed system acts like a single virtual system.
  • 3. Cont… • Resource manager: – Controls the assignment of resources to processes. – Routes the processes to suitable nodes of the system in such a manner that resource usage, response time, network congestion, and scheduling overhead are optimized.
  • 4. Techniques Task assignment approach: • Each process submitted by a user for processing is viewed as a collection of related tasks. • Tasks are scheduled to suitable nodes to improve performance.
  • 5. Cont… Load-balancing approach: • All the processes submitted by the users are distributed among the nodes of the system. • Equalizes the workload among the nodes.
  • 6. Cont… Load-sharing approach: • Attempts to conserve the ability of the system, assuring that no node is idle while processes wait for being processed.
  • 7. Desirable features of a good Scheduling Algorithms • No a priori knowledge about the processes. • Dynamic in nature. • Quick decision-making capability. • Balanced system performance. • Stability. • Scalability. • Fault tolerance. • Fairness of service.
  • 8. Task assignment approach • A process is considered to be composed of multiple task. • Goal is to find an optimal assignment policy for the task of an individual process.
  • 9. Cont… Assumptions: 1. A process has already been split into pieces called tasks. 2. Amount of computation required by each task and speed of each processor are known. 3. The cost of processing each task on every node of the system is known. 4. The IPC costs between every pair of task is known.
  • 10. Cont… 5. Other constraints, like Resource requirements of the tasks and the available resources at each node are also known. 6. Reassignment of the tasks is generally not possible.
  • 11. Cont… • Goals:  Minimization of IPC costs  Quick turnaround time for the complete process  A high degree of parallelism  Efficient utilization of system resources in general • These goals often conflict with each other.
  • 12. Cont… • Two task assignment parameters – Task execution cost and – Inter-task communication cost
  • 13. Cont…: Example • Total tasks = 6 • Total nodes = 2
  • 14. Cont… Inter task communications cost Execution costs t1 t2 t3 t4 t5 t6 Task Nodes t1 0 6 4 0 0 12 n1 n2 t2 6 0 8 12 3 0 t1 5 10 t3 4 8 0 0 11 0 t2 2 ∞ t3 4 4 t4 0 12 0 0 5 0 t4 6 3 t5 0 3 11 5 0 0 t5 5 2 t6 12 0 0 0 0 0 t6 ∞ 4
  • 15. Cont… Serial assignment Optimal assignment Task Node Task Node t1 n1 t1 n1 t2 n1 t2 n1 t3 n1 t3 n1 t4 n2 t4 n1 t5 n2 t5 n1 t6 n2 t6 n2
  • 16. Cont… Serial assignment execution cost (x) = x11+x21+x31+x42+x52+x62 = 5+2+4+3+2+4 = 20 Serial assignment communication cost (c) = c14+c15+c16+c24+c25+c26+c34+c35+c36 = 0+0+12+12+3+0+0+11+0 = 38 Total Serial assignment cost = x + c = 20 + 38 = 58
  • 17. Cont… Optimal assignment execution cost (x) = x11+x21+x31+x41+x51+x62 = 5+2+4+6+5+4 = 26 Optimal assignment communication cost (c) = c16+c26+c36+c46+c56 = 12+0+0+0+0 = 12 Total Optimal assignment cost = x + c = 26 +12 = 38
  • 18. Load balancing approach • Load balancing Algorithms are also known as load-leveling algorithms. – Based on the intuition of better resource utilization. • Algorithm tries to balance the total system load by transparently transferring the workload from heavily loaded nodes to lightly loaded nodes. • Goal: maximize the total system throughput.
  • 19. Taxonomy of load balancing
  • 20. Static vs. Dynamic • Static algorithms: • Use only information about the average behavior of the system, ignoring the current state of the system. • Simpler because no need to maintain and process system state information. • Do not react to the current system state.
  • 21. Cont… • Dynamic algorithms: • React to the system state that changes dynamically. • Able to avoid those state with unnecessarily poor performance. • More complex than static algorithms.
  • 22. Deterministic vs. Probabilistic • Both are Static load balancing algorithms. • Deterministic algorithms: – Use the information about the properties of the node and characteristics of the processes. – Difficult to optimize and cost more to implement.
  • 23. Cont… • Probabilistic algorithms: – Use information regarding static attributes of the system. – Easier to implement. – Suffer from having poor performance.
  • 24. Centralized vs. Distributed • Centralized algorithm: – The responsibility of scheduling physically resides on a single node. – System state information is collected at a single node at which all the scheduling decisions are made. • Known as Centralized server node.
  • 25. Cont… – Problem : reliability • If the centralized server fails, all scheduling in the system would cease. – Solution : replicate the server on K+1 nodes if it is to survive k faults.
  • 26. Cont… • Distributed algorithms: – The work involved in making process assignment decisions is physically distributed among the various nodes of the system. – Avoids the bottleneck of collecting state information at a single node. – Allows the scheduler to react quickly to dynamic changes in the state.
  • 27. Cont… – Algorithm is composed of entities known as local controllers. – Each entity is responsible for making scheduling decisions for the processes of its own node.
  • 28. Co-operative vs. Non-Cooperative • Non-cooperative algorithms : • Individual entities act as autonomous entities and make scheduling decisions independently of the actions of other entities.
  • 29. Cont… • Cooperative algorithms: • Distributed entities cooperate with each other to make scheduling decisions. • More complex and involve larger overhead than non-cooperative.
  • 30. Issues in designing load balancing algorithms • Load estimation policy • Process transfer policy • State information exchange policy • Location policy • Priority assignment policy • Migration limiting policy
  • 31. Cont… • Local Process – A process which is processed at its originated node. • Remote Process – A process which is processed at a node different than the one on which it originated.
  • 32. Load Estimation Policies • Estimation based on parameters like: 1. Total no. of processes on the node at the time of load estimation. 2. Resource demands of these processes. 3. Instruction mixes of these processes. 4. Architecture and speed of the node’s processor.
  • 33. Cont… • Sum of the remaining service times of all the processes on a node can be a measure for estimating a node’s workload. • Issue: how to estimate the remaining service time of the processes?
  • 34. Cont… • Solutions: 1. Memoryless method • This method assumes that all processes have the same expected remaining service time, independent of the time used so far. • It reduces the load estimation method to that of total number of processes.
  • 35. Cont… 2.Pastrepeats • This method assumes that the remaining service time of a process is equal to the time used so far by it. 3.Distribution method • If the distribution of service times is known, the associated process’s remaining service time is the expected remaining time conditioned by the time already used.
  • 36. Process Transfer Policies • Load balancing algorithms use the threshold policy to decide whether a node is lightly or heavily loaded. • The threshold value of a node: – the limiting value of its workload, – used to decide whether a node is lightly or heavily loaded.
  • 37. Cont… • Methods to determine the threshold value of a node: 1. Static policy • Each node has a predefined threshold value depending on its processing capability. • This value does not vary with the dynamic changes in workload at local or remote nodes. • No exchange of state information among the nodes to decide this value.
  • 38. Cont… 2. Dynamic policy • The threshold value of a node is calculated as a product of the average workload of all the nodes and a predefined constant (ci). • Nodes exchange state information by using one of the state information exchange policies. • It gives a more realistic value of threshold for each node. • Involves overhead in exchange of state information.
  • 39. Cont… • Most load balancing algorithms uses a single threshold and thus only have overloaded and under loaded regions.
  • 41. Cont… : Single-threshold policy • A node accepts new processes (either local or remote) based on its load. – Accepts if load is below the threshold value. – Rejects if load is above the threshold value. • It makes scheduling algorithms unstable.
  • 42. Cont… – A node should only transfer one or more of its processes to another node if such transfers greatly improves the performance of the rest of its local processes. – A node should accept remote processes if its load is such that the added workload of processing these incoming processes does not significantly affect the service to the local ones.
  • 43. Cont… : Double-threshold policy • Also known as high-low policy. • Use of two threshold values: high mark and low mark. • Three regions : – Overloaded – Normal – Under loaded
  • 44. Cont… • For overloaded region: – New local processes are sent to be run remotely and requests to accept remote processes are rejected. • For normal region: – New local processes run locally and requests to accept remote processes are rejected.
  • 45. Cont… • For underloaded region: – New local processes run locally and requests to accept remote processes are accepted.
  • 46. Location policies 1. Threshold 2. Shortest 3. Bidding 4. Pairing
  • 47. Cont… : Threshold • A destination node is selected at random. • A check is made to determine – whether the transfer of the process to that node would place it in a state that prohibits the node to accept remote processes. – If not, the process is transferred to the selected node, which must execute the process regardless of its state when the process actually arrives.
  • 48. Cont… • If the check indicates that the selected node is in a state that prohibits it to accept remote processes, another node is selected at random and probed in the same manner. • A static probe limit LP is used here. • The performance with a small probe limit (e.g. 3 or 5) is almost as good as the performance with a large probe limit (e.g. 20).
  • 49. Cont… : Shortest • LP distinct nodes are chosen at random and each is polled in turn to determine its load. • The process is transferred to the node having the minimum load value, unless that node’s load is such that it prohibits the node to accept remote processes.
  • 50. Cont… • If none of the polled node can accept the process, it is executed at its originating node. • Discontinue probing whenever a node with zero load is encountered.
  • 51. Cont… : Bidding • Each node in the network is responsible for two roles : manager and contractor. • The Manager represents a node having a process in need of a location to execute. • The Contractor represents a node that is able to accept remote processes.
  • 52. Cont… • To select a node for its processes, a manager broadcasts a request-for-bids message to all other nodes in the system. • The contractors return bids to the manager node. • Manager transfers the process to the node with best bid.
  • 53. Cont… • Problem: – A contractor may win many bids from many other manager nodes and thus becomes overloaded. • Solution: – On choosing best bid, manager node may send a message to the owner of that bid and send process on acknowledgement.
  • 54. Cont… • Both manager and contractor are free to take decisions. • Drawback of bidding policy: – Communication overhead – Difficult to decide a good pricing policy.
  • 55. Cont… : Pairing • This policy reduces the variance of loads only between pairs of nodes of the system. • Two nodes that differ greatly in load are temporarily paired with each other. • The load-balancing operation is carried out between the nodes belonging to the same pair.
  • 56. Cont… • A node only tries to find a partner if it has at least two processes; otherwise migration from this node is never reasonable. • Use of random selection of pair. • The pair is broken as soon as the process migration is over.
  • 57. State information exchange policies 1. Periodic broadcast 2. Broadcast when state changes 3. On- demand exchange 4. Exchange by polling
  • 58. Cont…: Periodic broadcast • Each node broadcasts its state information after the elapse of every t units of time. • Generates heavy traffic. • Possibility of fruitless messages being broadcast. • Poor scalability problem.
  • 59. Cont…: Broadcast when state changes • A node broadcasts its state information only when its state changes. – When a process arrives at that node or when a process departs from that node. – When its state switches from the normal load region to either the underloaded region or the overloaded region. • Works with two-threshold transfer policy.
  • 60. Cont…: On- demand exchange • A node broadcasts a StateInformationRequest message when its state switches from the normal load region to either the underloaded region or the overloaded region. • Receiving nodes send their current state to the requesting node. • Policy works with two-threshold transfer policy.
  • 61. Cont… • The status of the requesting node is included in the StateInformationRequest message. • If this status is – Underloaded, only overloaded nodes will respond to it. – Overloaded, only underloaded nodes will respond to it.
  • 62. Cont…: Exchange by polling • No need for a node to exchange its state information with all other nodes in the system. • When a node needs the cooperation of some other node for load balancing, it can search for a suitable partner by randomly polling the other nodes one by one.
  • 63. Priority Assignment Policies 1. Selfish 2. Altruistic 3. Intermediate
  • 64. Cont… • Selfish: – Local processes are given higher priority than remote processes. – Yields the worst response time performance among other policies. • Poor performance of remote processes. • Best response time for local processes.
  • 65. Cont… • Altruistic: – Remote processes are given higher priority than local processes. – Policy has best response time of the three policies.
  • 66. Cont… • Intermediate: – The priority of processes depends on the number of local processes and the number of remote processes at the concerned node. – If no. of local nodes is greater than or equal to the no. of remote processes, priority will be given to local processes otherwise to remote processes. – Overall response time performance is much closer to that of the altruistic policy.
  • 67. Migration- limiting policies • A decision about the total no. of times a process should be allowed to migrate. • Two migration-limiting policies: – Uncontrolled – Controlled
  • 68. Cont… • Uncontrolled – A remote process arriving at a node is treated just as a process originating at the node. – A process may be migrated any no of times.
  • 69. Cont… • Controlled – To overcome the instability problem of the uncontrolled policy, most system treat remote processes different from local processes and use a migration count parameter.
  • 70. Load sharing approach • For the proper utilization of the resources of a distributed system it is not required to balance the load on all the nodes. • It is necessary and sufficient to prevent the nodes from being idle while some other node have more than two processes.
  • 71. Cont… • This rectification is often called dynamic load sharing instead of dynamic load balancing.
  • 72. Issues in designing load-sharing algorithms • Load sharing algorithms do not attempt to balance the average workload on all the nodes of the system, rather they only attempt to ensure that no node is idle when a node is heavily loaded. • The priority assignment policies and migration limiting policies are same as that for the load-balancing algorithms. Other policies are described here.
  • 73. Cont… : Load Estimation Policy • It is sufficient to know whether a node is busy or idle. • Methods for estimating load: – Count the total number of processes on a node. – Measure CPU utilization.
  • 74. Cont… : Process transfer policies • All-or-nothing strategy: – Uses the single threshold policy with the threshold value of all the node fixed at 1 and some uses 2. – Drawback : Loss of available processing power in the system. – Solution : use a threshold value of 2 instead of 1.
  • 75. Location policies 1. Sender-initiated policy 2. Receiver-initiated policy
  • 76. Sender initiated location policy • Heavily loaded nodes search for lightly loaded node to which work may be transferred. • When load becomes more than the threshold value, it either broadcasts a message or randomly probes the other nodes one by one to find a lightly loaded node.
  • 77. Cont… • In the broadcasting method, the presence or absence of a suitable receiver node is known as soon as the sender node receives reply messages from the other nodes.
  • 78. Cont… • In the random probing method, the probing continues until either a suitable node is found or the no. of probes reaches a static probe limit, Lp. • Fixed limit has better scalability than broadcast method.
  • 79. Receiver-initiated location policy • Lightly loaded node search for heavily loaded nodes from which work may be transferred. • When a node’s load falls below the threshold value either it broadcasts a message indicating its willingness to receive processes or randomly probes the other nodes one by one to find a heavily loaded node. • In the broadcast method, a suitable node is found as soon as the receiver node receives reply messages from the other nodes.
  • 80. Cont… • In the random probing method, the probing continues until either a suitable node is found or the no. of probes reaches a static probe limit, Lp.
  • 81. Cont… • Both sender-initiated and receiver-initiated policies offer substantial performance advantages over the situation in which no load sharing is attempted. • Sender-initiated policies are preferable at light to moderate system loads, while receiver-initiated policies are preferable at high system loads.
  • 82. Cont… • If the cost of process transfer under receiver- initiated policies is significantly greater than under the sender-initiated policies due to the preemptive transfer of processes, sender- initiated policies provide uniformly better performance.
  • 83. State information Exchange Policy 1. Broadcast when state changes. 2. Poll when state changes.