Scheduling Resources in Multi-User Heterogeneous Computing Environments with SmartNet

Download
Author
Freund, Richard F.
Gherrity, Michael
Ambrosius, Stephen
Campbell, Mark
Halderman, Mike
Hensgen, Debra Z.
Keith, Elaine
Kidd, Taylor
Kussow, Matt
Lima, John D.
Mirabile, Francesca
Moore, Lantz
Rust, Brad
Siegel, H.J.
Date
1998Metadata
Show full item recordAbstract
It is increasingly common for computer users to have access to several computers on a network, and hence tobe able to execute many of their tasks on any of several computers. The choice of which computers execute which tasks is commonly determined by users based on a knowledge of computer speeds for each task and the current load on each computer. A number of task scheduling systems have been developed that balance the load of the computers on the network, but such systems tend to minimize the idle time of the computers rather than minimize the idle time of the users. This paper focusesonthebene ts that can be achieved when the scheduling system considers both the computer availabilities and the performance of each task on each computer. The SmartNet resource scheduling system is described and compared to two di erent resource allocation strategies: load balancing and user directed assignment. Results are presented where theoperation of hundreds of di erent networks of computers running thousands of di erent mixes of tasks are simulated in a batch environment. These results indicate that, for the computer environments
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Multi-armed bandit models of network intrusion in the cyber domain
Kronzilber, Dor (Monterey, California: Naval Postgraduate School, 2017-09);We model attacks against computer networks in the cyber domain from the attacker’s point of view. We consider an attacker with limited resources and time, whose goal is to maximize the expected reward earned by exploiting ... -
Turbo Pascal implementation of a distributed processing network of MS-DOS microcomputers connected in a master-slave configuration
Ard, Nelson C. (Monterey, California. Naval Postgraduate School, 1989-12);This thesis describes the design and implementation of a distributed processing network of IBM PC compatible computers capable of performing parallel processing tasks. The network is a star cluster local area network, ... -
Developing a reliable methodology for assessing the computer network operations threat of North Korea
Brown, Christopher (Monterey, California. Naval Postgraduate School, 2004-09);Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation ...