Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud Traffic Congestion Avoidance System Using Genetic Algorithm

D. Kesavaraja, A. Suthan, J. Mark Jain

Abstract


Congestion control has been always a major problem when network and data transmission gets involved. With the emergence of cloud computing the same problem applies to cloud computing environment too. In this paper we consider the problem of congestion control in cloud web computing environment which support both multirate multicast sessions and unicast sessions. Our work proposes an efficient congestion control mechanism using genetic algorithm, which identifies service state information of the communication. A Subserver justifies packet speed labeled by identifier and it decides the rapidness in which the receiver should receive the packet. Based on the receiver‟s requirement speed, the sub server splits the packets and forwards it. Also it identifies service state information for allocating bandwidth to the receivers. We propose an architecture that significantly reduces this implementation complexity but still achieves approximately fair bandwidth allocations. The congestion-control mechanism takes into account the diverse user requirements when different receivers within a multicast session have proper fitness functions in GA, but does not require the network to have any knowledge about the receiver utility functions.

Keywords


Cloud Computing, Congestion Control, Genetic Algorithm, Multi Cast, Traffic Flow, Packet Transfer

Full Text:

PDF

References


K. Kar, S. Sarkar, and L. Tassiulas, “Optimization based rate control for multirate multicast sessions,” in Proc. IEEE INFOCOM, 2001, pp.123–132.

S. Deb and R. Srikant, “Congestion control for fair resource allocation in networks with multicast flows,” in Proc. IEEE Conf. Decision and Control, Dec. 2001, pp. 1911–1916.

Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business By D.Kesavaraja , R. Balasubramanian And D. Sasireka, International Journal of Database Management Systems ( IJDMS ),(ISSN: 0975-5705)

E. Graves, R. Srikant, and D. Towsley, “Decentralized computation of weighted max- min fair bandwidth allocation in networks with multicast flows,” in Proc. Tyrrhenian Int. Workshop Digital Communications (IWDC‟01), Taormina, Italy, Sept. 2001, pp. 326–342.

William Stallings, “Cryptography and Network Security Principles and Practices”, Third Edition, Prentice Hall, 2003.

S. Selvakani† and r.s. rajesh††, †asst. prof, mca dept, scad college of engg & technology, tirunelveli, tamil nadu, india ††reader, dept of cse, ms university, tirunelveli, tamil nadu ,genetic algorithm for framing rules for intrusion detection in ijcsns international journal of computer science and network security, vol.7 no.11, november 2007

Java 2: The Complete Reference, Patrick Naughton and Herbert Schildt, Tata McGraw Hill, 1999.

The Java Language Specification, 2nd ed, James Gosling, Bill Joy, Guy Steele & Gilad Bracha, Sun Microsystems, 2000.

Kleber vieira, alexandre schulter, carlos becker westphall, and carla merkle westphall,federal university of santa catarina, brazil , intrusion detection for grid and cloud computing in it pro july/august 2010

Ann cavoukian , privacy in the clouds in springer dec 2008

Ayda saidane, vincent nicomette, and yves deswarte, member, ieee , the design of a generic intrusion-tolerant architecture for web servers in ieee transactions on dependable and secure computing, vol. 6, no. 1, january-march 2009

Xiao qin, senior member, ieee, hong jiang, member, ieee,adam manzanares, student member, ieee, xiaojun ruan, student member, ieee, and shu yin, student member, ieee , communication-aware load balancing for parallel applications on clusters in ieee transactions on computers, vol. 59, no. 1, january 2010

Paulo sousa, member, ieee computer society, alysson neves bessani, miguel correia, member, ieee, nuno ferreira neves, member, ieee, and paulo verissimo, fellow, ieee , highly available intrusion-tolerant services with proactive-reactive recovery in ieee transactions on parallel and distributed systems, vol. 21, no. 4, april 2010

“Malicious-and Accidental-Fault Tolerance for Internet Applications: Conceptual Model and Architecture,” Technical Report 03011, Project IST-1999-11583 MAFTIA, Deliverable D21, D. Powell and R. Stroud, eds., LAAS-CNRS, Jan. 2003.

http://support.sas.com/documentation/cdl/en/orlsoug/59688/HTML/default/ga_sect67.htm

http://www.obitko.com/tutorials/genetic-algorithms/example-function-minimum.php

http://en.wikipedia.org/wiki/Genetic_algorithm


Refbacks

  • There are currently no refbacks.