Skip to main content

Equity Data Distribution Algorithms on Identical Routers

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1059))

Abstract

This paper focuses on the problem related to assigning several big data packages on different routers when seeking equity of sending time. It is challenging to find a good algorithm that can distribute big data on routers before sending them. We assume that all routers share the same technical characteristics. The problem is as follows. Given a set of big data, represented by its size in MB, the objective is to plan the assignment so that the minimum time sending gap exists between the routers. The objective function of the optimizing problem is the minimization of the size gap. This optimization problem is very NP-hard. We propose a new summarized network architecture, based on adding a new component: a scheduler. The scheduler applies several algorithms to search for a resolution to the studied problem. Four heuristics were developed, and experimental results are provided to allow a comparison between heuristics. Two classes of instances are provided. The results given by generated instances show that the performance of heuristics.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen X, Han Z, Zhang H, Xue G, Xiao Y, Bennis M (2018) Wireless resource scheduling in virtualized radio access networks using stochastic learning. IEEE Trans Mobile Comput 1:1–1

    Google Scholar 

  2. Dell’ Amico M, Martello S (1995) Optimal scheduling of tasks on identical parallel processors. ORSA J Comput 7(2):191–200

    Article  Google Scholar 

  3. Devi CD, Vidya K (2019) A survey on cross-layer design approach for secure wireless sensor networks. In: International conference on innovative computing and communications. Springer, Heidelberg, pp 43–59

    Google Scholar 

  4. Gumusalan A, Simon R, Aydin H (2018) Flexible real-time transmission scheduling for wireless networks with non-deterministic workloads. Ad Hoc Netw 73:65–79

    Article  Google Scholar 

  5. Haouari M, Gharbi A, Jemmali M (2006) Tight bounds for the identical parallel machine scheduling problem. Int Trans Oper Res 13(6):529–548

    Article  MathSciNet  Google Scholar 

  6. Haouari M, Jemmali M (2008) Tight bounds for the identical parallel machine-scheduling problem: Part ii. Int Trans Oper Res 15(1):19–34

    Article  MathSciNet  Google Scholar 

  7. Lawler EL, Lenstra JK, Kan AHR, Shmoys DB (1993) Sequencing and scheduling: algorithms and complexity. Handbooks Oper Res Manage Sci 4:445–522

    Article  Google Scholar 

  8. Ma D, Tsudik G (2010) Security and privacy in emerging wireless networks. IEEE Wireless Commun 17(5)

    Google Scholar 

  9. Melhim LKB, Jemmali M, Alharbi M (2018) Intelligent real-time intervention system applied in smart city. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), IEEE, pp 1–5

    Google Scholar 

  10. Pisinger D (2003) Dynamic programming on the word ram. Algorithmica 35(2):128–145

    Article  MathSciNet  Google Scholar 

  11. Roy B, Sen AK (2019) Meta-heuristic techniques to solve resource-constrained project scheduling problem. In: International conference on innovative computing and communications. Springer, Heidelberg, pp 93–99

    Google Scholar 

  12. Sarma HKD, Kar A (2006) Security threats in wireless sensor networks. In: Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International, IEEE, pp 243–251

    Google Scholar 

  13. Sharma S, Mishra R, Singh K (2013) A review on wireless network security. In: International conference on heterogeneous networking for quality, reliability, security and robustness. Springer, Heidelberg, pp 668–681

    Google Scholar 

  14. Yu S, Liu M, Dou W, Liu X, Zhou S (2017) Networking for big data: a survey. IEEE Commun Surv Tutorials 19(1):531–549

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahdi Jemmali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jemmali, M., Alquhayz, H. (2020). Equity Data Distribution Algorithms on Identical Routers. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_26

Download citation

Publish with us

Policies and ethics