Browsing by Author "Oluwatope, Ayodeji"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- ItemOpen AccessComputational Modeling of Collaborative Resources Sharing in Grid System(Springer Link, 2011-03) Oluwatope, Ayodeji; Iyanda, Duada; Aderounmu, Ganiyu; Adagunodo, RotimiIn grid computing, Grid users who submit jobs or tasks and resources providers who provide resources have different motivations when they join the Grid system. However, due to autonomy both the Grid users’ and resource providers’ objectives often conflict. This paper proposes autonomous hybrid resource management algorithm aim at optimizing the resource utilization of resources providers using “what-you-give-is-what-you-get” Service Level Agreements resource allocation policy. Utility functions are used to achieve the objectives of Grid resource and application. The algorithm was formulated as joint optimization of utilities of Grid applications and Grid resources, which combine the resource contributed, incentive score, trustworthiness and reputation score to compute resource utilization. Simulations were conducted to study the performance of the algorithm using GridSim v5.0. The simulation results revealed that the algorithm yields significantly good result because no user can consume more than what it contribute under different scenarios; hence the problem of free riding has been addressed through this algorithm. KeywordsResource scheduling–Grid System–Computational modeling
- ItemOpen AccessDeveloping a Feedback Model for Managing Congestion in Packet Switched Wide Area Networks.(Springer Link, 2010-01) Ogbimi, E.F.; Aderounmu, Ganiyu A.; Oluwatope, AyodejiThe objectives of the paper was to design a feedback model for congestion control in packet switched WAN and carry out the performance evaluation of the model. A feedback approach was generated by designing a feedback model. Control theory was used to assess the stability of thebandwidth. The stability of flow of bandwidth was determined by finding the transfer function of the routers. A fluid flow model was developed using a queuing model. Secondly, the flow of bandwidth was optimized and the stability was checked. The conditions for stability in a packet switched WAN were established.
- ItemOpen AccessAn e-business grid model architecture for small and medium scale enterprises(2010-05) Bello, Sururah Apinke; Oluwatope, Ayodeji; Abiona, Olatunde; Sanni, Mistura; Onime, Clement E.; Eludiora, Safiriyu Ijiyemi; Aderounmu, Ganiyu A; Adagunodo, E. R.; Kehinde, L. O.In grid computing a loosely coupled and virtual computing infrastructure is created out of a collection of connected heterogeneous processors sharing various combinations of resources. It is pertinent to note that African Small and Medium Enterprises (SMEs) cannot participate in the global market using the current e-business solution due to the lack of or nonexistent infrastructure to support such services. In this paper, we propose a grid service based solution that is indigenous to African SMEs and technologically tailored to meet their local needs. The solution is based on an Application Service Provider (ASP) grid framework. The framework is specified using Universal Modeling Language (UML)
- ItemOpen AccessA Load Balancing Policy for Distributed Web Service(Scientific Research, 2010-01) Eludiora, Safiriyu Ijiyemi; Aderounmu, Ganiyu A.; Abiona, Olatunde; Oluwatope, Ayodeji; Onime, Clement E.; Kehinde, L. O.he proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distributed Web Servers (DWSs) provide an effective solution for improving the quality of web services. This paper addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having considered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, making it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java Development Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput.
- ItemOpen AccessA Load Balancing Policy for Distributed Web Service(International Journal of Communications, Network and System Sciences, 2010-01) Eludiora, Safiriyu; Abiona, Olatunde; Aderounmu, Ganiyu; Oluwatope, Ayodeji; Onime, Clement; Kehinde, LawrenceThe proliferation of web services; and users appeal for high scalability, availability and reliability of web servers to provide rapid response and high throughput for the Clients’ requests occurring at anytime. Distrib-uted Web Servers (DWSs) provide an effective solution for improving the quality of web services. This pa-per addresses un-regulated jobs/tasks migration among the servers. Considering distributed web services with several servers running, a lot of bandwidth is wasted due to unnecessary job migration. Having consid-ered bandwidth optimization, it is important to develop a policy that will address the bandwidth consumption while loads/tasks are being transferred among the servers. The goal of this work is to regulate this movement to minimize bandwidth consumption. From literatures, little or no attention was given to this problem, mak-ing it difficult to implement some of these policies/schemes in bandwidth scarce environment. Our policy “Cooperative Adaptive Symmetrical Initiated Dynamic/Diffusion (CASID)” was developed using Java De-velopment Environment (JADE) a middle ware service oriented environment which is agent-based. The software was used to simulate events (jobs distribution) on the servers. With no job transfer allowed when all servers are busy, any over loaded server process jobs internally to completion. We achieved this by having two different agents; static cognitive agents and dynamic cognitive agents. The results were compared with the existing schemes. CASID policy outperforms PLB scheme in terms of response time and system throughput
- ItemOpen AccessA User Identity Management Protocol for Cloud Computing Paradigm( International Journal of Communications, Network and System Sciences, 2011-01) Eludiora, Safiriyu Ijiyemi; Oluwatope, Ayodeji; Abiona, Olatunde; Oluwaranti, AdeniranCloud computing paradigm is a service oriented system that delivers services to the customer at low cost. Cloud computing needs to address three main security issues: confidentiality, integrity and availability. In this paper, we propose user identity management protocol for cloud computing customers and cloud service providers. This protocol will authenticate and authorize customers/providers in other to achieve global security networks. The protocol will be developed to achieve the set global security objectives in cloud computing environments. Confidentiality, integrity and availability are the key challenges of web services’ or utility providers. A layered protocol design is proposed for cloud computing systems, the physical, networks and application layer. However, each layer will integrate existing security features such as firewalls, NIDS, NIPS, Anti-DDOS and others to prevent security threats and attacks. System vulnerability is critical to the cloud computing facilities; the proposed protocol will address this as part of measures to secure data at all levels. The protocol will protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility.