Adaptive workflow scheduling for dynamic grid and cloud computing environment

Mustafizur Rahman, Rafiul Hassan, Rajiv Ranjan*, Rajkumar Buyya

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

138 Scopus citations

Abstract

Effective scheduling is a key concern for the execution of performance-driven grid applications such as workflows. In this paper, we first define the workflow scheduling problem and describe the existing heuristic-based and metaheuristic-based workflow scheduling strategies in grids. Then, we propose a dynamic critical-path-based adaptive workflow scheduling algorithm for grids, which determines efficient mapping of workflow tasks to grid resources dynamically by calculating the critical path in the workflow task graph at every step. Using simulation, we compared the performance of the proposed approach with the existing approaches, discussed in this paper for different types and sizes of workflows. The results demonstrate that the heuristic-based scheduling techniques can adapt to the dynamic nature of resource and avoid performance degradation in dynamically changing grid environments. Finally, we outline a hybrid heuristic combining the features of the proposed adaptive scheduling technique with metaheuristics for optimizing execution cost and time as well as meeting the users requirements to efficiently manage the dynamism and heterogeneity of the hybrid cloud environment.

Original languageEnglish
Pages (from-to)1816-1842
Number of pages27
JournalConcurrency Computation Practice and Experience
Volume25
Issue number13
DOIs
StatePublished - 10 Sep 2013
Externally publishedYes

Keywords

  • adaptive scheduling
  • grid computing
  • workflow management

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Computer Science Applications
  • Computer Networks and Communications
  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Adaptive workflow scheduling for dynamic grid and cloud computing environment'. Together they form a unique fingerprint.

Cite this