• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wu Linping, Meng Dan, Liang Yi, Tu Bibo, Wang Lei. LUNF—A Cluster Job Scheduling Strategy Using Characterization of Nodes' Failure[J]. Journal of Computer Research and Development, 2005, 42(6): 1000-1005.
Citation: Wu Linping, Meng Dan, Liang Yi, Tu Bibo, Wang Lei. LUNF—A Cluster Job Scheduling Strategy Using Characterization of Nodes' Failure[J]. Journal of Computer Research and Development, 2005, 42(6): 1000-1005.

LUNF—A Cluster Job Scheduling Strategy Using Characterization of Nodes' Failure

More Information
  • Published Date: June 14, 2005
  • Owing to the outstanding scalability of cluster systems, the demand of high performance can be easily met by increasing the number of nodes. But, with the scale of cluster system expanding, node failures become a commonplace feature of such large-scale systems. New ways are needed to accommodate the occurrence of node failure. As an important part of cluster operating system software, job scheduling completes the task of high efficient resource management and reasonable job scheduling. The function of job scheduling in cluster system is divided into two sub-processes: strategy of job selection and node allocation policy. In this paper, the LUNF (longest uptime node first) node allocation policy is introduced using characterization of nodes' failure. The simulation results show that LUNF policy do better than random node allocation policy for the system performance.
  • Related Articles

    [1]Zhao Shengnan, Jiang Han, Wei Xiaochao, Ke Junming, Zhao Minghao. An Efficient Single Server-Aided k-out-of-n Oblivious Transfer Protocol[J]. Journal of Computer Research and Development, 2017, 54(10): 2215-2223. DOI: 10.7544/issn1000-1239.2017.20170463
    [2]Zhang Hongbin, Ji Donghong, Yin Lan, Ren Yafeng, Niu Zhengyu. Caption Generation from Product Image Based on Tag Refinement and Syntactic Tree[J]. Journal of Computer Research and Development, 2016, 53(11): 2542-2555. DOI: 10.7544/issn1000-1239.2016.20150906
    [3]Chen Tieming, Yang Yimin, Chen Bo. Maldetect: An Android Malware Detection System Based on Abstraction of Dalvik Instructions[J]. Journal of Computer Research and Development, 2016, 53(10): 2299-2306. DOI: 10.7544/issn1000-1239.2016.20160348
    [4]Liu Duo, Dai Yiqi. Construction of Transformation Matrix with a Given Period Modulo N[J]. Journal of Computer Research and Development, 2012, 49(5): 925-931.
    [5]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [6]Sun Decai, Sun Xingming, Zhang Wei, and Liu Yuling. A Filter Algorithm for Approximate String Matching Based on Match-Region Features[J]. Journal of Computer Research and Development, 2010, 47(4): 663-670.
    [7]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
    [8]Zhang Yuejie, Xu Zhiting, and Xue Xiangyang. Fusion of Multiple Features for Chinese Named Entity Recognition Based on Maximum Entropy Model[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [10]Tang Huanling, Sun Jiantao, Lu Yuchang. A Weight Adjustment Technique with Feature Weight Function Named TEF-WA in Text Categorization[J]. Journal of Computer Research and Development, 2005, 42(1): 47-53.

Catalog

    Article views (841) PDF downloads (626) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return