Skip to main content
Article thumbnail
Location of Repository

Intelligent architecture for automatic resource allocation in computer clusters

By Sophia Corsava and Vladimir Getov

Abstract

As the need for more reporting and assessment of information increase exponentially, computer-based applications consume resources at an alarmingly rapid rate. Therefore, traditional techniques for managing resource allocation, topology and systems need urgent revision. In this paper, we present an intelligent architecture that introduces a new strategy for managing resource discovery, allocation and dynamic reconfiguration at run-time. Our building methodology involves the employment of new types of clustered systems based on large application groupings, each having a master cluster controller. Each controlling engine consists of self-healing intelligent entities that can compensate for a variety of software or hardware\ud problems. We also present evaluation results of extensive\ud experiments in a production environment, which demonstrate the advantages of our approach

Topics: UOW3
Publisher: IEEE Computer Society
OAI identifier: oai:westminsterresearch.wmin.ac.uk:838
Provided by: WestminsterResearch

Suggested articles

Citations

  1. (1993). A Translation Approach to Portable Ontology Specifications”,
  2. Automating data dependability”,
  3. (1999). Fault-tolerant replication management in large-scale distributed storage systems”,
  4. (2003). Getov Vladimir, “Intelligent FaultTolerant architecture for cluster computing”, to appear at IASTED,
  5. Getov Vladimir, “Self-Healing Intelligent Infrastructure for Computational Clusters”,
  6. (2000). Knowledge Representation: Logical, Philosophical, and Computational Foundations”,
  7. (1999). Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence”,
  8. (1999). Reasoning with cause and effect”, IJCAI Award Lecture,
  9. (2000). Server, release 1.3.0, Veritas Software Corporation,
  10. (2001). The Secure Shell: The Definitive Guide”, O'Reilly & Associates,
  11. Unix Shells by example”,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.