Free Essay

Submitted By anVaithi

Words 1116

Pages 5

Words 1116

Pages 5

SASTRA UNIVERSITY

Shanmugha Arts, Science, Technology and Research Academy Thirumalaisamudram Thanjavur – 613 402

BCSCCS705 PARALLEL COMPUTING AND ALGORITHMS LAB B.TECH (COMPUTER SCIENCE AND ENGINEERING) 7TH SEMESTER

ii

List of Exercises:

1. Basic arithmetic operations in parallel 2. Find out factorial of a number 3. Generation of Fibonacci series, finding prime numbers in an interval. 4. Evaluate the integral of a function 5. Merging of two sorted lists 6. Parallel tree traversals 7. Matrix multiplication 8. Enumeration sort 9. Odd-Even transposition sort 10. Bitonic merge 11. Quick sort 12. Single source shortest path

iii

Exercise 1 Aim:

Basic Arithmetic Operations in parallel

To perform a set of arithmetic operations in parallel using a cluster of computers Procedure: Step 1: Identify a set of numbers over which arithmetic operations are to be done Step 2: Identify the rank in the cluster Step 3: Split the set of numbers into domains and assign each domain to their corresponding processor Step 4: Get the result from each computer in the cluster and assimilate them at the master Step 5: Verify the time taken for the completion of each task. Algorithm:function sum(+,identity,a) = if #a == 1 then [identity] else let e = even_elts(a); o = odd_elts(a); s = scan_op(op,identity,{op(e,o): e in e; o in o}) in interleave(s,{op(s,e): s in s; e in e});

iv

Input:- An array of integers

Output: - The sum

3,2,7,6 P1 18 0,5,4,8 P2 17 62 2,0,1,5 P3 8 2,3,8,6 P4 19

Pre lab: To know the processing environment, a program using size and rank of the processors in the cluster.

v

Exercise 2 Aim:

Factorial of a number

To find a factorial of number in parallel using a cluster of processors Procedure: step 1 : Identify a number for which factorial is to calculated step 2: Identify the rank in the cluster step 3: Split the number into ranges and assign each range to one processor each step 4: Get the result from each processor in the cluster and find the cumulative result at the master step 5: Verify the time taken for the completion of each task.

Pre lab: Program to find the factorial of given no using all processors in the cluster without splitting into ranges.

vi

Exercise 3 Aim:

Generation of Fibonacci series and Finding prime numbers in an interval.

To generate the Fibonacci series of numbers and finding a set prime number in a given interval Procedure: Fibonacci step 1 : Identify a maximum limit up to which Fibonacci series has to be generated. step 2: Identify the rank step 3: if rank==1 then apply the formula , fib1[i]=fib1[i-1]+fib1[i-2] step 4: if rank==2 then apply the formula, fib2[0] = (pow((1+sqrt(5))/2,9) – pow((1-sqrt(5))/2,9))/sqrt(5) fib2[1] = (pow((1+sqrt(5))/2,10) – pow((1-sqrt(5))/2,10))/sqrt(5) step 4: Get the result from each computer in the cluster and assimilate them at the server. step 5: Verify the time taken for the completion of each task.

vii

Prime

Example:-

viii

Exercise 4 Aim:

Evaluate integral of a function

To find the integral of a function in parallel using a cluster of processors. Procedure: step 1 : Identify the function and integration limit.

( take any function for f(x) ex: Any curve fuction) step 2: Split the integral limit into ranges and assign each range to one processor. step 3: Get the result from each processor in the cluster and find the cumulative result at the master step 4: Verify the time taken for the completion of each task.

Prelab: Quadratic equation.

ix

Exercise 5 Aim:

Merging of Sorted Lists

To merge two sorted lists using a cluster of computers Procedure: step 1: Accept the list of numbers step 2: Divide the unsorted list into two sub lists of equal size. step 3: Sort each sub list using 2 processors. step 4: Let A[1 .. m] and B[1 .. n] be sorted sequences and compute the sorted merge C[1 .. m+n] of A and B. step 5: Verify the time taken for the completion of each task Algorithm merge(A, B) Input sequences A and B with n/2 elements each Output sorted sequence of A and B S ← empty sequence while ¬A.isEmpty() and ¬B.isEmpty() if A.first().element() < B.first().element() S.insertLast (A. remove (A. first ())) else S.insertLast(B.remove(B.first())) while ¬A.isEmpty()

x

S.insertLast(A.remove(A.first())) while ¬B.isEmpty() S.insertLast(B.remove(B.first())) return S

Prelab: Bubble sort.

Exercise 6 Aim:

Parallel Tree Traversal

To perform tree traversal using a cluster of computers Procedure: step 1: Create a binary tree for a given set of data step 2: Split the tree into left sub tree and right sub tree step 3: Assign them to one processor each step 4: Use any tree traversal method in processors step 4: Get the ordered data at the master end from each processor step 5: Verify the time taken for the completion of each task

xi

Algorithm:PRE-ORDER: Algorithm preorder(T, v) visit node v if T.hasLeft(v) preorder(T, T.left(v)) if T.hasRight(v) preorder(T, T.right(v)) // recursively traverse right sub tree POST-ORDER Algorithm postorder(T, v) postorder(T, T.left(v)) if T.hasRight(v) postorder(T, T.right(v)) // recursively traverse right sub tree visit node v IN-ORDER Algorithm inorder(T, v) if T.hasLeft(v) inorder(T, T.left(v)) // recursively traverse left subtree visit node v if T.hasRight(v) inorder(T, T.right(v)) // recursively traverse right sub tree // recursively traverse left sub tree // recursively traverse left sub tree

xii

INPUT: A binary tree T and a node v of T.

OUTPUT A preorder traversal of the tree shown in Figure visits the nodes in the following order:

A postorder traversal of the tree shown in Figure visits the nodes in the following order:

An inorder traversal of the tree shown in Figure visits the nodes in the following order:

Pre lab: Binary search.

xiii

Exercise 7 Aim:

Matrix Multiplication

To perform matrix multiplication using a cluster of computers Procedure: step 1: Accept two Matrices step 2: Decide on the number of processors in the cluster. step 3: Send the matrices and the range of values to be Processed by each processor step 4: Form the resultant matrix at the master end step 5: Verify the time taken for the completion of each task Algorithm:Begin For i…...

Free Essay

...Artificial Intelligence and Grid Computing Scott Carnahan Net 204-102 Artificial Intelligence and Grid Computing This paper is a look into how Artificial Intelligence (AI) can be used in a network environment with grid computing. I will briefly look into how AI works, grid computing and what you get when you put the two together. What is Artificial Intelligence and how does it work Artificial Intellegence is a branch of computer science that atemps to simulate intelligent behavior in computers, that is to say, to get a machine to imitate intelligent human behavior(Merriam-Webster) and with any luck ignore unintelligent human beahviour. AIs have to learn concepts of the things they observer or work with, they then store what they have learned, like any other software, as chunks of data. An AI is usually presented with a goal to achieve they accomplish this by exploiting the relationship between the data they acquired and the goal they are trying to achieve (wiseGEEK). To put it into a simpler concept; AI is broken down into an If, and Then type programing analogy.” If this happens Then do that”, pretty much like Basic Programing. But the If-Thens are attached to something not so simple, complex algorithms that are used to record what all the results of the Ifs and Thens are, so that the data can be accessed by the AI, then when the condition happens again it knows what to do. For a little better explanation of AI algorithms look at Google's cloud-based machine......

Words: 1490 - Pages: 6

Premium Essay

...Cloud Computing ABSTRACT Cloud computing is Internet- ("cloud-") based development and use of computer technology ("computing"). In concept, it is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption and delivery model for IT services based on Internet, and it typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet. The term cloud is used as a metaphor for the Internet, based on the cloud drawing used to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. Typical cloud computing providers deliver common business applications online which are accessed from a web browser, while the software and data are stored on servers. These applications are broadly divided into the following categories: Software as a Service (SaaS), Utility Computing, Web Services, Platform as a Service (PaaS), Managed Service Providers (MSP), Service Commerce, and Internet Integration. The name cloud computing was inspired by the cloud symbol that is often used to represent the Internet in flow charts and diagrams. THE CLOUD COMPUTING AN......

Words: 1760 - Pages: 8

Free Essay

...Introduction to Algorithms Second Edition This page intentionally left blank Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest Clifford Stein Introduction to Algorithms Second Edition The MIT Press Cambridge, Massachusetts London, England Dubuque, IA St. Louis Montr´ al e Madison, WI Toronto McGraw-Hill Book Company Boston Burr Ridge, IL New York San Francisco This book is one of a series of texts written by faculty of the Electrical Engineering and Computer Science Department at the Massachusetts Institute of Technology. It was edited and produced by The MIT Press under a joint production-distribution agreement with the McGraw-Hill Book Company. Ordering Information: North America Text orders should be addressed to the McGraw-Hill Book Company. All other orders should be addressed to The MIT Press. Outside North America All orders should be addressed to The MIT Press or its local distributor. Third printing, 2002 c 2001 by The Massachusetts Institute of Technology First edition 1990 All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. This book was printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Introduction to algorithms / Thomas H. Cormen . . . [et al.].—2nd ed. p. cm. Includes bibliographical references and...

Words: 426328 - Pages: 1706

Free Essay

...Genetic Algorithm Approach to Solve the Shortest Path Problem for Road Maps Sachith Abeysundara*, Baladasan Giritharan+, Saluka Kodithuwakku◊ *Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: sachith@email.com Telephone: (+94) 81 2374652 + Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: bgiri@pdn.ac.lk ◊ Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: salukak@pdn.ac.lk Telephone: (+94) 81 2394260 Abstract—This paper presents a new genetic algorithm approach to solve the shortest path problem for road maps. This is based on the analogy of finding the shortest possible distance between two towns or cities in a graph or a map with potential connection, which means that the path distances are always positive. Typically this is represented by a graph with each node representing a city and each edge being a path between two cities and there exist some traditional algorithms that produce solutions for the problem. A new method is found to solve the shortest path problem using GAs. The algorithm has been tested for a road map containing more than 125 cities and the experimental results guarantee to provide acceptably good solutions for the given search space. HE shortest path problem is typical in the world of combinatorial systems. This research will attempt to apply a Genetic algorithm to......

Words: 2513 - Pages: 11

Free Essay

...Grid computing Modern society as a large-scale scientific and engineering computing need, forcing the computer must constantly improve its computing speed and storage capacity. History has shown that development of the computer, in order to achieve better processing performance, in addition to improve the speed of the hardware, the system must continue to improve the structure, especially when the components of the speed limit, which will become the focus of . Thus, the super parallel computer has become the master of complex scientific computing. However, the super computer-centric computing model has obvious deficiencies, and is currently being subjected to challenge. Although it is a super computer processing power of the "giant", but its cost is extremely expensive and usually only a few state-level sectors such as aerospace, military, meteorological and other departments have the ability to configure such a device. And as people encounter in their daily work more and more complex business computing, there is an urgent need for data-processing capabilities more powerful computers, while the price of supercomputers clearly prevented it from entering areas of work of ordinary people. So, people started looking for a low cost and superior data processing capability computing model, scientists have been trying to find the ultimate answer - Grid Computing (Grid computing). Grid is an integrated computing environment and resources, or a pool of computing resources. Grid is......

Words: 526 - Pages: 3

Free Essay

...Vijay V. Vazirani College of Computing Georgia Institute of Technology Copyright c 2001 Approximation Algorithms Springer Berlin Heidelberg NewYork Barcelona Hong Kong London Milan Paris Singapore Tokyo To my parents Preface Although this may seem a paradox, all exact science is dominated by the idea of approximation. Bertrand Russell (1872–1970) Most natural optimization problems, including those arising in important application areas, are NP-hard. Therefore, under the widely believed conjecture that P = NP, their exact solution is prohibitively time consuming. Charting the landscape of approximability of these problems, via polynomial time algorithms, therefore becomes a compelling subject of scientiﬁc inquiry in computer science and mathematics. This book presents the theory of approximation algorithms as it stands today. It is reasonable to expect the picture to change with time. The book is divided into three parts. In Part I we cover a combinatorial algorithms for a number of important problems, using a wide variety of algorithm design techniques. The latter may give Part I a non-cohesive appearance. However, this is to be expected – nature is very rich, and we cannot expect a few tricks to help solve the diverse collection of NP-hard problems. Indeed, in this part, we have purposely refrained from tightly categorizing algorithmic techniques so as not to trivialize matters. Instead, we have attempted to capture, as accurately as possible, the individual......

Words: 140657 - Pages: 563

Premium Essay

...Autonomic Computing: An Overview Manish Parashar1 and Salim Hariri2 The Applied Software Systems Laboratory, Rutgers University, Piscataway NJ, USA 2 High Performance Distributed Computing Laboratory, University of Arizona, Tucson, AZ, USA parashar@caip.rutgers.edu, hariri@ece.arizona.edu 1 Abstract. The increasing scale complexity, heterogeneity and dynamism of networks, systems and applications have made our computational and information infrastructure brittle, unmanageable and insecure. This has necessitated the investigation of an alternate paradigm for system and application design, which is based on strategies used by biological systems to deal with similar challenges – a vision that has been referred to as autonomic computing. The overarching goal of autonomic computing is to realize computer and software systems and applications that can manage themselves in accordance with high-level guidance from humans. Meeting the grand challenges of autonomic computing requires scientiﬁc and technological advances in a wide variety of ﬁelds, as well as new software and system architectures that support the effective integration of the constituent technologies. This paper presents an introduction to autonomic computing, its challenges, and opportunities. 1 Introduction Advances in networking and computing technology and software tools have resulted in an explosive growth in networked applications and information services that cover all aspects of our life. These......

Words: 5552 - Pages: 23

Free Essay

...DAG Topological Sort O(V+E) -performed on directed acyclic graph Linear ordering of all its vertices such that if G contains an edge (u,v) then u appears before v in the order. 1. call DFS(G) to compute finishing times v.f for each vertex v 2. as each vertex is finished insert it onto the front of a linked list 3. return the linked list of vertices 4. Lecture 5 (01/28) Posted on: Monday, January 28, 2013 Topics: Strongly Connected Components, Activity Selection Reading: CLRS (22.5, 16.1), KT (4.1) Scheduling Probelem Set of n activities which can be served only one at a time, each with start time s and finish time f Selecct a maximum-size subset of mutually compatible activities (meaning no overlap) GREEDY ALGORITHM Note that putting the job with the earliest finish time allows for the most amount of jobs to follow, because it allows the machine to have the most possible time to get to other jobs Take job with lowest finish time, then reduce set to all job that don’t overlap, then choose lowest finishing time, recursively. * Lecture 6 (01/30) Posted on: Wednesday, January 30, 2013 Topics: Activity Selection, Coloring Interval Graphs, Scheduling Reading: CLRS (16.1, 16.2), KT (4.1, 4.2) * Lecture 07 (02/04) Posted on: Wednesday, February 6, 2013 Topics: Minimizing Maximum Lateness, Sorting (Insertion Sort, Merge Sort, Quick Sort) Reading: CLRS (Chp 2, 7.1, 7.2), KT (4.2) Insertion sort Starting from the second element as key......

Words: 5019 - Pages: 21

Free Essay

...Algorithms Assignment 1 Kent Vuong Table of Contents Question 1 3 Machine Code (First Generation or 1GL) 3 Assembler (Second Generation or 2GL) 3 Procedural (Third Generation or 3GL) 3 Non-Procedural (Fourth Generation or 4GL) 4 Object Orientated 4 Describe the purpose and functions of an OS with the following terms 4 Scheduling 4 Managing Concurrency 4 Managing Memory 4 Managing Devices 5 File Systems 5 Describe the purpose of each of the following utility software programs. 5 File Compression 5 Defragmenter 5 Anti-Virus 5 Anti-Malware 5 What is application software, give three examples 5 What are the software licensing requirements for the following types of software 6 Freeware 6 Open Source 6 Shareware 6 Question 1 Machine Code (First Generation or 1GL) Machine Code is the Language that the Computer understands and reads, following the precise instructions, which is sometimes the problem with computers and the relaxed non-procedural human brain. The MIPS architecture provides a specific example for a machine code whose instructions are always 32 bits long. The general type of instruction is given by the op (operation) field, the highest 6 bits. J-type (jump) and I-type (immediate) instructions are fully specified by op. R-type (register) instructions include an additional field function to determine the exact operation. Assembler (Second Generation or 2GL) Assembler is a program which makes object codes by encoding...

Words: 1019 - Pages: 5

Free Essay

...Design and Analysis of Computer Algorithm Assignment 2 Name: Boyu Zhang UTD-ID: 2021226566 Email:bxz140830@utdallas.edu Contents Problem 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Problem 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Problem 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Problem 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Problem 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Problem 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Problem 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Problem 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 Problem1 This problem can solution by Dial’s algorithm in the lesson six. We can set up W+2 buckets with the labels of 0, 1, …, W, . Then we carry out the following steps: (a). Initial the buckets with node S be in the bucket 0 and all other nodes be in the bucket . (b). then select the node with the minimum temporary distance label. For the first time, it should be the source node S in the bucket 0. (c). Update the buckets information. Then some node should be moved from the bucket to the corresponding distance bucket. (d). Remove the selected node from the bucket. Then repeat step 2 and 3 until there is no non-empty bucket.......

Words: 726 - Pages: 3

Free Essay

...T C L I F F O R D STEIN INTRODUCTION TO ALGORITHMS T H I R D E D I T I O N Introduction to Algorithms Third Edition Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest Clifford Stein Introduction to Algorithms Third Edition The MIT Press Cambridge, Massachusetts London, England c 2009 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. For information about special quantity discounts, please email special sales@mitpress.mit.edu. This book was set in Times Roman and Mathtime Pro 2 by the authors. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Introduction to algorithms / Thomas H. Cormen . . . [et al.].—3rd ed. p. cm. Includes bibliographical references and index. ISBN 978-0-262-03384-8 (hardcover : alk. paper)—ISBN 978-0-262-53305-8 (pbk. : alk. paper) 1. Computer programming. 2. Computer algorithms. I. Cormen, Thomas H. QA76.6.I5858 2009 005.1—dc22 10 9 8 7 6 5 4 3 2 2009008593 Contents Preface xiii I Foundations 1 2 Introduction The Role of Algorithms in Computing 5 1.1 Algorithms 5 1.2 Algorithms as a technology 11 Getting Started 16 2.1 Insertion sort 16 2.2 Analyzing algorithms 23 2.3 Designing algorithms 29 3 3 4 Growth of Functions 43 3.1......

Words: 387342 - Pages: 1550

Free Essay

...Practical 1.1 : Basic of Cluster Computing 1. INTRODUCTION 1.1 Background study Parallel computing has seen many changes since the days of the highly expensive and proprietary super computers. Changes and improvements in performance have also been seen in the area of mainframe computing for many environments. But these compute environments may not be the most cost effective and flexible solution for a problem. Over the past decade, cluster technologies have been developed that allow multiple low cost computers to work in a coordinated fashion to process applications. The economics, performance and flexibility of compute clusters makes cluster computing an attractive alternative to centralized computing models and the attendant to cost, inflexibility, and scalability issues inherent to these models. Many enterprises are now looking at clusters of high-performance, low cost computers to provide increased application performance, high availability, and ease of scaling within the data center. Interest in and deployment of computer clusters has largely been driven by the increase in the performance of off-the-shelf commodity computers, high-speed, low-latency network switches and the maturity of the software components. Application performance continues to be of significant concern for various entities including governments, military, education, scientific and now enterprise organizations. This document provides a review of cluster computing, the various types of clusters......

Words: 5312 - Pages: 22

Free Essay

...1. Illustrate the operation of Radix_sort on the following list of English words: cow, dog, seq, rug, row, mob, box tab, bar ear, tar, dig, big, tea, now, fox. ANSWER: It is a sorting algorithm that is used to sort numbers. We sort numbers from least significant digit to most significant digit. In the following array of words, three is the maximum number of digits a word has, hence the number of passes will be three. In pass 1, sort the words alphabetically using first letter from the right. For eg, tea has “a” as the last letter, hence it comes first, similarly mob which has “b” as the last letter comes second. In this way the remaining words are sorted. In pass 2, sort the words alphabetically using second letter from the right. For eg, tab has “a” as its middle letter which comes first, then comes bar and so on. In pass 3, sort the words alphabetically using third letter from the right. For eg, bar has “b” as its first letter from left and since no word starts with “a”, bar will appear first. Similarly, big, box, cow and so on. UNSORTED ARRAY | PASS 1 | PASS 2 | PASS 3(SORTED ARRAY) | cow | tea | tab | bar | dog | mob | bar | big | seq | tab | ear | box | rug | rug | tar | cow | row | dog | tea | dig | mob | dig | seq | dog | box | big | dig | ear | tab | seq | big | fox | bar | bar | mob | mob | ear | ear | dog | now | tar | tar | cow | row | dig | cow | row | rug | ...

Words: 1470 - Pages: 6

Free Essay

...Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers IEEE Computer Society .- Sponsored by the Microprocessor and Microcomputer Standards Committee h Published by the Institute of Electrical and Electronics Engineers, Inc., 345East 4Tth Street, New York, N y lwlz USA. lEEE December 2, 1994 SH 1 7335 Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. THIS PAGE WAS BLANK IN THE ORIGINAL Authorized licensed use limited to: UNIVERSITY OF VICTORIA. Downloaded on July 29,2010 at 20:21:17 UTC from IEEE Xplore. Restrictions apply. Recognized as an American National Standard (ANSI) IEEE Std 1284-1994 IEEE Standard Signaling Method for a Bidirectional Parallel Peripheral Interface for Personal Computers Sponsor Microprocessor and Microcomputer Standards Committee of the IEEE Computer Society Approved March 30, 1994 IEEE Standards Board Approved September 2, 1994 American National Standards Institute Abstract: A signaling method for asynchronous, fully interlocked, bidirectional parallel communications between hosts and printers or other peripherals is defined. A format for a peripheral identification string and a method of returning this string to the host outside of the bidirectionaldata stream is also specified. Keywords: bidirectional parallel communications, computers, interfaces,......

Words: 34986 - Pages: 140

Free Essay

...section-2. In replication consistency is an important issue that needs to be considered. To overcome this problem as in other papers, it is assumed that: access pattern is read only for all replicas in data grid. The remainder of paper is organized as follows. Related work on replication and scheduling is given in section 3. A 3-layerd hierarchical structure is proposed for replication in data grid based on classification of networks, along with a novel algorithm for this structure is given in section 4. Section 5, covers the simulation result with optorsim and section 6 concludes the paper. Summary In data grids huge amount of data are generated and processed by users around the world. Objective of dynamic replica strategies is reducing file access time by reducing network traffic, which leads to reducing job runtime. In this paper a replication algorithm for a 3-level hierarchical structure and a scheduling algorithm are proposed. The simulation results with optorsim show better performance (over 13%) comparing to current algorithms. Key words: Data replication; Data Grid, Job Scheduling, Simulation 1. Introduction Grid was first proposed by Foster and Kesselman [1], which is a mechanism for resource sharing and problem solving in heterogeneous environment. Grid is a wide heterogeneous distributed system with multiple administrative domains for application that needs huge amount of computational and storage resources. An important kind of grid is data grid, which......

Words: 3673 - Pages: 15