Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Engineering simulated evolution for virtual machine assignment problem
Sait S., Shahid K. Applied Intelligence43 (2):296-307,2015.Type:Article
Date Reviewed: Oct 27 2015

Nowadays, computing tends to be performed less and less on single computers, but rather on centralized pools of resources collectively known as virtual machines. While this concentration of resources brings undoubtedly great advantages in terms of computing power, flexibility, and availability, it also poses new problems in resource allocations that were never experienced in older architectures. It has been proved that allocating virtual machines to the underlying hardware is a nondeterministic polynomial-time (NP)-hard problem; moreover, in these environmentally conscious times, all of this must be done with the aim of lowering energy consumption. This paper presents a heuristic algorithm to solve this problem.

The general idea is to use as few hardware resources as possible to set up all of the required virtual machines. In the paper, methods currently in use are presented first, and then a new method is proposed by the authors. In this method, virtual machines are expressed in terms of resources (central processing units (CPUs), memory, bandwidth, and so on), which can be modified at will by system administrators. The method itself consists of an initial assignment of resources followed by a cycle of resource evaluation, selection, and allocation. This cycle can be repeated as many times as desired; the tricky part is knowing when to stop, or when subsequent iterations do not improve performance anymore. In the final part, the paper presents a MATLAB implementation of the algorithm and its use to test the overall performance of the model, both by itself and as compared to more traditional heuristic models (namely, simulated annealing).

Assigning virtual machines is an activity for very specialized professionals. Although the paper describes the method in mathematical terms--rigorous and to the point, but certainly not easy reading--those professionals will find precious insights here.

Reviewer:  Andrea Paramithiotti Review #: CR143887 (1601-0055)
Bookmark and Share
  Featured Reviewer  
 
Cloud Computing (C.2.4 ... )
 
 
Combinatorics (G.2.1 )
 
 
Artificial Intelligence (I.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Cloud Computing": Date
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (1 of 3)
Dec 14 2009
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (2 of 3)
Jan 26 2010
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (3 of 3)
Mar 18 2010
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy