ArticlePDF Available

CHALLENGES OF CLOUD COMPUTE LOAD BALANCING ALGORITHMS

Authors:

Abstract

Cloud computing reshaped the modern world by offering solutions to all problems faced by organizations. Cloud computing provides computational services for users in a pay-per-use fashion. Hence, they do not need to purchase these resources for their use. With the help of cloud computing services, users can use Software, Hardware, infrastructure, and many other computational resources without taking the pain of their maintenance. Because of their versatile services, cloud computing service providers face many challenges such as security, privacy, quality of service and load balancing. In this research, we focus on load-balancing issues and investigate significant challenges in the load-balancing domain of cloud computing. At the start, we introduce domain knowledge related to cloud computing technologies and then briefly discuss load balancing techniques. At last, we present some potential challenges in load balancing techniques.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
m@International Research Journal of Modernization in Engineering, Technology
and Science
[1]
CHALLENGES OF CLOUD COMPUTE LOAD BALANCING ALGORITHMS
Mr. Gopala Krishna Sriram*1
*1 Software Architect, EdgeSoft Corp, McKinney, TX USA
ABSTRACT
Cloud computing reshaped the modern world by offering solutions to all problems faced by organizations. Cloud
computing provides computational services for users in a pay-per-use fashion. Hence, they do not need to
purchase these resources for their use. With the help of cloud computing services, users can use Software,
Hardware, infrastructure, and many other computational resources without taking the pain of their maintenance.
Because of their versatile services, cloud computing service providers face many challenges such as security,
privacy, quality of service and load balancing. In this research, we focus on load-balancing issues and investigate
significant challenges in the load-balancing domain of cloud computing. At the start, we introduce domain
knowledge related to cloud computing technologies and then briefly discuss load balancing techniques. At last, we
present some potential challenges in load balancing techniques.
Keywords: Cloud Computing, Load Balancing, Algorithms, Load Distribution, Heterogeneous Nodes, Single Point of
Failure, Etc.
I. Introduction
The excellent Cloud computing services reshape the world of Information Technology. Not only IT companies but
also other business organizations and individual's leverages cloud computing technology. The more core concept
of cloud computing is to provide users with computing services in a pay-per-use fashion[1]. Cloud allows users to
use a shared pool of computing resources. These resources are hardware-based; they include Software, network,
platform, and many other valuable resources. Several companies provide cloud services; the top of them are
Amazon Web Service (AWS), Google Cloud, Microsoft Azure, RackSpace, IBM Cloud; the primary goal of the cloud is
to provide distributed services to improve throughput and performance. Users task from all around the world are
distributed among widely spread data centers to improve speed and performance for those jobs. Cloud computing
distributed services must gain more popularity than other distributed technologies like grid computing peer-to-
peer computing. One reason for this popularity is the vast cloud services[2]. Cloud computing can be categorized
on two bases, one is location-based, and the other is offered services. The base of the location cloud can be
categorized as public, private and hybrid cloud. The cloud has three basic categories based on services provided,
but immense extended categories exist.
The essential services provide Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a
Service (IaaS). There can be many other services such as Hardware as a Service (HaaS), Communication as a
Service (CaaS), Database as a Service (DaaS), broadly we can tell that XaaS(anything as a service)
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[2]
Fig 1: cloud computing service model
Since cloud computing offers immense services, they need Quality of Services (QoS) monitoring to evaluate their
services for fulfilling user requirements. The cloud faces many challenges during this process, such as load
balancing, performance analysis, monitoring, throughput, response time, security, and privacy. Load balancing is a
significant challenge to avoid overloading or underloading virtual machines during service provision. Cloud
companies need to identify these potential challenges and find effective load balancing techniques to improve their
quality. This research has the following objectives
State of the art related to different available load balancing techniques
Taxonomies different load balancing techniques and investigate challenges of existing load balancing
techniques
Point out different research areas for future researchers.
Rest of this paper, we will provide domain knowledge of our target study area, which is load balancing in cloud
computing. Afterwards, we will present currently available load balancing techniques and categorize them. At last,
we will propose a research area in load balancing in cloud computing.
II. Background
This section will provide preliminary knowledge about load balancing techniques, why we need load
balancing, the used technologies for load balancing and other domain knowledge.
Load balancing techniques are used to balance the load on virtual cloud machines so that each machine
can work equally according to its capacity. By load balancing, tasks can be equally distributed to each
virtual machine and hence get the best performance from each. With the help of load balancing
techniques, cloud services providers can manage workload on virtual machines. Virtual machines are
the core of cloud computing infrastructure. Cloud service providers provide hardware access to users
with the help of virtual machines. Virtual machines can act as one or more servers. One machine can act
on more than one server.
In contrast, more than one machine can also manage one server machine[3]. Furthermore, through load
balancing, cloud providers ensure that in case of failure of one machine to complete, operations will not
disturb. In addition to this, load balancing also provides scalability for those applications whose size can
grow or shrink with time. Since scalability is one of the significant characteristics of cloud computing, it
cannot be achieved without proper load balancing techniques[2]. The other responsibilities of load
balancing techniques are to provide energy efficiency, green cloud by reducing carbon emission, QoS
requirement fulfilment and other services[4, 5].
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[3]
Fig 2: load-balancing model
III. Challenges Of Load Balancing
In this section, we will discuss the significant challenges cloud computing service providers face,
particularly for load balancing and other security-related aspects since cloud computing has gained the
attention of researchers due to its challenging nature. Cloud researchers work on virtual machine
migrations, fail tolerance, virtual machine security, QoS satisfaction, and other related issues [6]. Load
balancing is one of the significant challenges for cloud computing researchers. For the rest of this
section, we will provide a few challenges in load balancing.
Geographically distributed nodes:
Data centers are primarily located in geographically isolated locations for large cloud computing
providers. These data centers act as a single server to solve user requirements. To make them act as a
single machine is a potential challenge, particularly for the environment where this distance is
considerable. There are many issues related to delay, such as communication speed, network
infrastructure and many more like this. If this separation is not at a long distance, network delay is
tolerated. Other challenges come even in geographically close data centers, such as choosing a suitable
algorithm that works well for all virtual machines.
Single point of failure:
Currently, available load balancing algorithms mostly use a single machine to control the load
balancing of other virtual machines: Particularly, most virtual machines in the cloud environment work
in a distributed fashion. Hence there is a need for distributed load balancing algorithms so that the
failure of a single machine does not cause the failure of all computing resources.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[4]
Virtual machine migration:
More than one virtual machine can be configured on a single physical machine or server. These virtual
machines act as different systems. In the case underlying physical machines become overloaded, virtual
machines need to be migrated from one machine to other physical machines. Load-balancing for such
kinds of VM migrations is a challenge to be addressed.
Heterogeneous nodes:
The early load-balancing researchers developed algorithms for homogeneous nodes. As user
requirements are complex, there comes a concept of heterogeneous nodes in a cloud environment. New
load-balancing techniques are much needed to meet the requirements of heterogeneous nodes.
Load balancing scalability:
Scalability refers to the increasing or decreasing computational user resources according to their
demand. Scalability and on-demand availability are essential features of cloud computing. To achieve
scalability suitable load-balancing algorithm is mandatory.
Algorithm complexity:
Load-balancing algorithms should make as efficient and straightforward as possible to overcome
overhead on cloud computing services
Fig 3: classification of load-balancing algorithm
Below we mentioned some load balancing techniques with their pros and cons.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[5]

    


















!

" 


#



$


%"

%
" 


&





'






(



%
(
)
*


+
*

*




*

" 

&
*
*
,
+" *
&
-


.*


#


-


+


/
Table 1: some general load-balancing techniques.
IV. Conclusion
Cloud computing is an ever-spading paradigm of the modern eras computing world. Cloud
computing researchers put their intensive care in various aspects; load-balancing is one of
them. Load-balancing refers to evenly distributing the computational load on virtual machines
of the cloud. In this research, we discussed some essential aspects of load-balancing
techniques. We focused mainly on the challenges of load-balancing techniques for future
researchers. This research can play a positive role for new researchers in cloud-computing
load-balancing to narrow their research problem.
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology
and
Science
Volume:04/Issue:01/ January-2022 Impact Factor- 6.752 www.irjmets.com
www.irjmets.co
m
@International Research Journal of Modernization in Engineering, Technology
and Science
[6]
REFERENCES
       !
"#ACM Compung Surveys (CSUR), "$%&'$()*
( +  !  ,-  .  /0    !  !  1          
" !"2Journal of King Saud University-Computer and Informaon Sciences, ()(
' ,+3 4 5! !&61 2&-&
Cluster Compung, &$()(
7 !4 3  ! ""2 #
arXiv preprint arXiv:1101.5613, ()
$ 3! et al.!"2Communicaons of the ACM, "$'7$)&
$8())
% / ,  9    !  4: ! ; ;  ,"#  +"    5 < 
,";arXiv preprint arXiv:1306.1394, ()'
... The majority of supply chain strategies hark back to a more stable economic climate. Competent top managers may be able to deal with challenges that arise throughout ordinary business cycles all while focus their strategic plan on cost reduction [5,6]. Healthcare supply chain management includes acquiring resources, managing supplies, and delivering goods and services to clinicians and patients. ...
... Equation (4) means that the amount used in each stage is less than its available amount. Equation (5) represents that the project activity cost TV is minimum, and the total cost in the process of project execution includes activity cost, raw material inventory and ordering cost. Equation (6) shows the raw material inventory at the end of last week plus the raw material arrival in this cycle, and then the raw material inventory at the conclusion of this cycle less the use of raw material in this cycle [31]. ...
Article
Full-text available
With the rapid development of Internet technology, the network information data is exploding, and society has entered the era of cloud data. Cloud data provides a lot of data support for people's life and work, but because of its large number, multifarious types and huge value, there are some problems such as private data leakage and abuse of sensitive information. Stocking of biomedical material at one place only, can cause delay in sending important lifesaving material to needy patients. On the one hand, it is an important content of engineering scheduling theory and method; On the other hand, in medical field, a lot of materials are usually consumed to protect the life of patients. Biomedical informatics and computer vision techniques have been combined in a variety of inter‐multidisciplinary disciplines during the past few decades. We are all aware that inadequate or insufficient cloud access management and controls can expose a corporation to a range of issues. The work that follows offers intelligent supply chain, an upgraded service management control telephone network architecture. If we can acquire according to the patient demands and retain the ideal inventory such that the patient requirement and interest can be safe, the overall cost will be lowered greatly. The experimental results show that R1 orders 31 times, and the total cost is 1,259,520 CNY. R2 ordered 24 times, with a total cost of 982,034 CNY; R3 orders 22 times, and the total cost is 990,146 CNY. Finally, the optimal solution of the total cost after schedule optimization is 3,231,700 CNY. It is proved that the optimal cost finally obtained by forecasting supply chain inventory information based on cloud data environment is also more practical for engineering practice.
... Higher implementation complexity will lead to more complex procedures, which can lead to negative performance issues Furthermore, when the algorithms require more information and higher communication for monitoring and control, delays would cause more problems and reduce efficiency. Therefore, to reduce overhead on cloud computing services, load-balancing algorithms should be as simple and effective as possible [9]. ...
Article
Full-text available
In the modern IT industry, cloud computing is a cutting-edge technology. Since it faces various challenges, the most significant problem of cloud computing is load balancing, which degrades the performance of the computing resources. In earlier research studies, the management of the workload to address all resource allocation challenges that caused by the participation of a large number of users has received important attention. When several people are attempting to access a given web application at once, managing all of those users becomes exceedingly difficult. One of the elements affecting the performance stability of cloud computing is load balancing. This article evaluates and discusses load balancing, the drawbacks of the numerous methods that have been suggested to distribute load among nodes, and the variables that are taken into account when determining the best load balancing algorithm.
... This results in highly scalable production methods and cheap production costs per device. MEMS are employed in a extensive variability of applications, including automotive, medical, electrical, telecommunication, and missile batteries [6,7]. MEMS is focused on transforming typically big, laborious mechanical systems into compact, higher performing, and very mass-producible alternatives, similar to how integrated circuit and semiconductor technologies have altered electrical and electronic systems. ...
... By merging wireless sensor and mobile networks with the Internet of Things, it is possible to develop new MANET-IoT devices and IT-based networks. This technology facilitates user mobility while decreasing network implementation expenses [27,28]. One of the fundamental principles of Internet of Things systems is the networking of intelligent objects and their compliance with communications technology. ...
Article
Full-text available
This paper provides a novel implementation of the intelligent water drops (IWD) method for resolving data aggregation issues in heterogeneous wireless sensor networks (WSN). When the aggregating node is utilized to transmit the data to the base station, the research attempts to show that the traffic situations of WSN may be modified appropriately by parameter tuning and algorithm modification. IWD is used to generate an optimum data aggregation tree in WSN as one of its applications. IWD assumes that all nodes in the environment are identical, resulting in identical parameter updates for all nodes. In practical scenarios, however, diverse nodes with variable beginning energy, communication range, and sensing range characteristics are deployed. In order to replicate the influence of heterogeneity in the environment, improved IID (IIWD) is offered as an enhancement to the original IID. The suggested enhancement is appropriate for scenarios in which the aggregation node is utilized to transmit data to the base station in heterogeneous configurations. In terms of residual energy, dead nodes, payload, and network lifespan, a series of simulation results demonstrates that the proposed IIWD significantly improves the accuracy and effectiveness of the IWD method in comparison.
... In this sense, many works highlight the main issues that impact the energy consumption savings and efficient workload distribution in Ubicomp environments, such as the large number of heterogeneous devices, the high variability of services' latency, and the huge amounts of data generated from the connected devices devices, which in turn implies high cost of communication bandwidth and high redundancy of data [15,19,[24][25][26][27][28]. In this regard, all these works agree the load balancing solutions for Ubicomp middlewares have to be set on the following considerations: ...
Article
Full-text available
The increasing evolution of computing technologies has fostered the new intelligent concept of Ubiquitous computing (Ubicomp). Ubicomp environments encompass the introduction of new paradigms, such as Internet of Things (IoT), Mobile computing, and Wearable computing, into communication networks, which demands more efficient strategies to deliver tasks and services, considering heterogeneity, scalability, reliability, and efficient energy consumption of the connected devices. Middlewares have a crucial role to deal with all these aspects, by implementing efficient load balancing methods based on the hardware characterization and the computational cost of the queries and tasks. However, most existing solutions do not take into account both considerations in conjunction. In this context, we propose a methodology to characterize distributed servers, services, and network delays in Ubicomp environments, based on the Server Ability to Answer a Query (SAAQ). To evaluate our SAAQ-based methodology, we implemented a simple middleware in a museum context, in which different IoT devices (e.g., social robots, mobile devices) and distributed servers with different capabilities can participate, and performed a set of experiments in scenarios with diverse hardware and software characteristics. Results show that the middleware is able to distribute queries to servers with adequate capacity, freeing from service requests to devices with hardware restrictions; thus, our SAAQ-based middleware has a good performance regarding throughput (22.52 ms for web queries), end-to-end delay communications (up to 193.30 ms between San Francisco and Amsterdam), and good management of computing resources (up to 80% of CPU consumption).
... However, it is very difficult to determine an appropriate Pc and Pm: when large values are used, good individuals may be destroyed, and the genetic algorithm turns arbitrary search algorithm, which destroys the stability and robustness of the algorithm, whereas when a smaller value is adopted, the algorithm will lose its ability to maintain population diversity, leading to premature convergence of the algorithm and falling into local solutions [5]. ey are frequently used in industry for a range of tasks such as issue prediction, fault diagnostics, centralized management, energy management, production management, and computer engineering, to mention a few [6,7]. By combining fuzzy logic reasoning method with genetic algorithm, an adaptive genetic algorithm formed on fuzzy reasoning is projected. ...
Article
Full-text available
To solve the difficulty in selecting the crossover probability and mutation probability in genetic algorithms, a fuzzy immune algorithm based on adaptive estimation of crossover probability and mutation probability in a fuzzy reasoning system is proposed, and it is used in the parameter optimization design of a two-degree-of-freedom PID controller. According to the experiment and simulation results, classic genetic algorithm evolution tends to halt after 37 generations, with a fitness value of 7.135, whereas fuzzy genetic algorithm evolution tends to stop after 20 generations, with a fitness value of 7.486. The 2-DOF PID controller that was created can give the system strong target value following and interference suppression features at the same time.
Article
Full-text available
Covid-19 has impacted negatively on people all over the world. Some of the ways that it has affected people include such as Health, Employment, Mental Health, Education, Social isolation, Economic Inequality and Access to healthcare and essential services. Apart from physical symptoms, it has caused considerable damage to mental health of individuals. Among all, depression is identified as one of the common illnesses which leads to early death. People suffering from depression are at a higher risk of developing other health conditions, such as heart disease and stroke, and are also at a higher risk of suicide. The importance of early detection and intervention of depression cannot be overstated. Identifying and treating depression early can prevent the illness from becoming more severe and can also prevent the development of other health conditions. Early detection can also prevent suicide, which is a leading cause of death among people with depression. Millions of people have affected from this disease. To proceed with the study of depression detection among individuals we have conducted a survey with 21 questions based on Hamilton tool and advise of psychiatrist. With the use of Python’s scientific programming principles and machine learning methods like Decision Tree, KNN, and Naive Bayes, survey results were analysed. Further a comparison of these techniques is done. Study concludes that KNN has given better results than other techniques based on the accuracy and decision tree has given better results in the terms of latency to detect the depression of a person. At the conclusion, a machine learning-based model is suggested to replace the conventional method of detecting sadness by asking people encouraging questions and getting regular feedback from them.
Article
In the Internet of Things (IoT) ecosystem, devices will predominate, using it in a manner similar to how people used it. Devices will cooperating in a multicast network to collect, share, and forward information way while interacting with one another autonomously and without centralised supervision. The building of an intelligent environment the capability of real-time collection of data, which is crucial for maximising the value of the IoT, will make this possible. A typical electric grid is made up of many power plants that use various power generating units, such as coal-based units, gas-based units, hydro units, etc. The majority of the infrastructure and wires that make up the conventional electricity grid have been in existence for a long time, it should be mentioned. They require significant investments, so providing them could take years. As a result, many grid components are outmoded and must be maintained and monitored on a regular basis to keep power flowing. A sophisticated technology is the smart grid (SG) system that makes it easier to integrate green technology and environmental considerations. The SG cyber–physical system was implemented thanks to the advancement and use of communication technologies in the conventional power system. The Internet of Things (IoT) and essential devices are both present in the complicated architecture of the SG systems. The traditional electric grids are been transformed into smart and efficient grid known as “Smart grid”. The Internet of Things’ smart grid allows for two-way communications among connected devices and technology that can recognise and respond to human needs. The cost and reliability of a smart grid are superior to that of conventional power infrastructure. Through use and data maintenance, smart grid technology will assist in reducing energy use and costs. One of the primary contributions made to grids is the integration of IoT with producing facilities using sustainable energy at various levels. To enhance the smart grid for bidirectional information exchange, improve power quality, and increase reliability Internet of Things (IOT) devices are becoming an important part of smart electric grid. IOT Infrastructure (IOTI) provide a flexible, efficient and secure platform providing strategic management for monitoring and controlling of different operations under different working conditions. This paper discusses cyber security on IOT based infrastructure for electric power systems. A comprehensive study is highlighted which includes type of IOTs, architecture used for smart grid, and future challenges.
ResearchGate has not been able to resolve any references for this publication.