Database Reference
In-Depth Information
t
1
and deadline are set as shown in
Figure 7.8
and the bandwidth scheduling process
starts from
t
1
:
1.
Between
t
1
and
t
2
, the initial available bandwidth
BW
2
is smaller than
minimumBW
so that
the link rate increases twice where the available bandwidth of the link increases to
BW
2
9
and
BW
2
99
respectively. Because
BW
2
99
is larger than
minimumBW
and smaller than
maxi-
mumBW
,
BW
2
99
is allocated in this time slot (striped area as shown in
Figure 7.8
).
2.
TS
(
t
2
) is skipped because of
shutdown
period.
3.
Between
t
3
and
t
4
, the available bandwidth of the link is already larger than
minimumBW
and
smaller than
maximumBW
. Hence, link rates remain unchanged and the current available
bandwidth is allocated.
4.
The bandwidth scheduling process repeats for each timeslot. Between
t
n
−
1
and
deadline
, the
available bandwidth is larger than
maximumBW so maximumBW is allocated.
5.
All the bandwidth is allocated in which the data transfer task is expected to be completed
between
t
n
−
1
and
deadline.
7.5
Evaluation of LRCDT
In this section we present the evaluation of our LRCDT strategy. To validate the ef-
fectiveness of the strategy in reducing energy consumption, we compare LRCDT with
two other existing popular strategies
[4,78]
from the aspects of energy consumption
and task completion time respectively. As mentioned in
Section 2.3
, the strategy pro-
posed by Chun et al.
[4]
is to transfer the data file in typical lazy fashion, where data
transfer is conducted with a constant minimum speed and completes by the deadline.
Meanwhile, the strategy proposed by Hays
[78]
transfers the data file in a typical eager
fashion and that data transfer is conducted at the maximum speed available. Accord-
ing to the characteristics of these two strategies, we name them as the minimum-speed
strategy and the maximum-speed strategy respectively.
In the evaluation, we build an environment to simulate data transfer links of a real
Cloud network. All the three data transfer strategies are simulated as three differ-
ent bandwidth scheduling processes following different rules. Simulations of all three
strategies are conducted based on randomly generated data transfer links with random
traffic conditions. We generate multiple data transfer links with different parameters,
and conduct the bandwidth scheduling processes with different rules on each data
transfer link. We obtained the bandwidth usage of data transfer links and calculated
the overall energy consumption during the period of task execution. Each simulation
with certain parameter sets was conducted several times, and all the simulation results
are the average results of the simulations.
7.5.1 Parameters of simulation
We have simulated all the three strategies based on randomly generated data transfer
links. In order to simulate the traffic conditions of a real data transfer link in the Cloud,
in each overall agenda of the generated links, the timeslots, available bandwidth
and link rate of each router are generated based on parameters including (
startTime
,
Search WWH ::
Custom Search