Advertisement

Based on the Predicted Blocking Virtual Machine Load Balancing Scheduling Strategy

  • Youhui JiangEmail author
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 517)

Abstract

The popularity of the Internet and the rapid development of the massive data promote the expansion of the field of cloud computing applications, which absorb the grid computing, utility computing, and other distributed technology, through the network sharing platform resources to improve the throughput of data processing speed and computing power. As the core of cloud computing virtualization technology, through the construction of multiple virtualization platforms, in order to achieve space expansion, backup, and other operations to achieve the purpose of efficient integration of resources, but in practical applications, with the increase in the size of resources, physical and virtual machine load balance contradiction has become increasingly prominent, if such problems are not a reasonable solution, both a waste of resources, but also interfere with the application performance, thus affecting the user experience. In this paper, we study the process of blocking technology proposed based on load balancing under the conditions of virtual machine scheduling strategy, and through experiments to verify its reliability and efficiency.

Keywords

Cloud computing Virtual machine scheduling Congestion prediction Load balancing 

References

  1. 1.
    Sun, K., Wu, D.: MPC-based delay-aware fountain codes for live video streaming. In: IEEE International Conference on Communications, ICC (2016)Google Scholar
  2. 2.
    Schmidt, R.O.: Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag. 34(3), 276–280 (1986)CrossRefGoogle Scholar
  3. 3.
    Sun, K., Zhang, H., Wu, D., Zhuang, H.: MPC-based delay-aware fountain codes for real-time video communication. IEEE Internet Things J. (IoT) (2016)Google Scholar
  4. 4.
    Tayem, N., Kwon, H.M.: L-shape 2-dimensional arrival angle estimation with propagator method. IEEE Trans. Antennas Propag. 53(5), 1622–1630 (2005)CrossRefGoogle Scholar
  5. 5.
    Liu, X., Li, Z.: Information-centric mobile ad hoc networks and content routing: a survey. Article in press (2016)Google Scholar
  6. 6.
    Gruteser, M., Grunwald, D.: Anonymous usage of location based services through spatial and temporal cloaking. In: ACM/USENIX MobiSys (2003)Google Scholar
  7. 7.
    Gu, J.F., Zhu, W.P., Swamy, M.N.S.: Joint 2-D DOA estimation via sparse l-shaped array. IEEE Trans. Signal Process. 31(5), 1171–1182 (2015)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Sun, K., Wu, D.: Video rate control strategies for cloud gaming. J. Vis. Commun. Image Represent. (2013)Google Scholar
  9. 9.
    Li, Z., Chen, Y.T., Shi, H., Liu, K.: NDN-GSM-R: a novel high-speed railway communication system via named data networking. EURASIP J. Wirel. Commun. Netw. (2016)Google Scholar
  10. 10.
    Sun, K., Yan, B., Gharavi, H.: Low complexity content-aware image retar-geting. In: IEEE International Conference on Image Processing (ICIP ’2012) (2012)Google Scholar
  11. 11.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location based queries in distributed mobile systems. In: Proceedings of International Conference on World Wide Web (WWW ’07), Banff, Alberta, Canada, pp. 1–10 (2007)Google Scholar
  12. 12.
    Li, Z., Liu, K.: MaPIT: an enhanced pending interest table for NDN with mapping bloom filter. IEEE Commun. Lett. 18(11) (2014)CrossRefGoogle Scholar
  13. 13.
    Xia, T.Q., Zheng, Y., Wan, Q., Wang, X.G.: 2-D angle of arrival estimation with two parallel uniform linear arrays for coherent signals. IEEE Radar Conf. 55(9), 244–247 (2007)Google Scholar
  14. 14.
    Sun, K., Yan, B.: Efficient P-frame complexity estimation for frame layer rate control of H.264/AVC. In: IEEE International Conference on Image Processing (ICIP ’2011) (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.College of Computer and Information Engineering, Tianjin Normal UniversityTianjinChina

Personalised recommendations