Task Scheduling of Cloud Computing in Weapon Network System

Article Preview

Abstract:

In recent years, the rapid development of cloud computing brings significant innovation in the whole IT industry. For the local tasks scheduling on each computational node of the top model of weapon network, an open task scheduling framework was introduced a task accept control scheme based on the tasks based on load balancing, quality of service (QoS) and an improved constant bandwidth server algorithm was presented. The result of simulation shows that the scheduling policies can improve the schedule speed when the number of tasks increases and can meet the demand better for the real time requirementsof the tactical training evaluation system for complexity and Large-scale.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

695-698

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Amazon inc. amazon Web services, EC2 site [EB/OL]. 2010. 12. 18. http: /aws. amazon. com/ec2.

Google Scholar

[2] Chen Kang, Zheng Weiming. Cloud computering: System instances and current research [J]. Journal of Soft, 2009, 20(5): 1337-1348.

Google Scholar

[3] WANG Jing-yu, TAN Yue-sheng, Research of resource allocation and job scheduling in cloud computing. Journal of Central South University (Science and Technology). 2010, 41(1): 46-49.

Google Scholar

[4] ZHANG Lei, CHAO Ai-nong, GUO Li-feng, Task Scheduling of Cloud Computing in Training Evaluation Simulation System. Computer simulation. 2012, 29(7): 114-116.

Google Scholar

[5] WANG Jingyu, TAN Yuesheng. Research of resource allocation and job scheduling in cloud computing. Journal of Central South University (Science and Technology). 2010, 41(1): 47-48.

Google Scholar

[6] ZUO Li-yun, ZUO Li-feng, Multi-objective integrated ant colony optimization scheduling algorithm based on cloud resource. Joumal of Computer Applications. 2012, 32(7): 1916-(1919).

DOI: 10.3724/sp.j.1087.2012.01916

Google Scholar