吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (01): 140-144.

• paper • Previous Articles     Next Articles

Message-oriented load balancing algorithm

WANG De-min1, HE Li-dong2, LIU Fei-fei2, SU Nan2, LIU Xin1   

  1. 1. Network Center, Jilin University,Changchun 130012,China;
    2. College of Computer Science and Technology, Jilin University,Changchun 130012,China
  • Received:2010-11-04 Online:2012-01-01 Published:2012-01-01

Abstract:

Based on the study of extensible authentication protocol (EAP) and Diameter protocol, a message-oriented load balancing (MOLB) algorithm was proposed. This algorithm can maintain the consistency of session between nodes in distributed authentication system and reduce the number of migration sessions when service nodes are varied. In this algorithm hash method, virtual nodes and red-black tree are combined to achieve a rational distribution of requests between service nodes. In the Diameter network environment, the experiment results show that compared with other commonly load balancing algorithms, MOLB algorithm has smaller load balancing degree, smaller session destruction degree and lower session destruction distribution degree.

Key words: computer application, Diameter protocol, load balancing, virtual node

CLC Number: 

  • TP393


[1] Edith Cohen. Proactive caching of DNS records: addressing a performance bottleneck//Applications and the Internet, 2001: 85-94.

[2] IETF. DNS Support for load balancing. . http://tools.ietf.org/html/rfc1794.

[3] Kargerl D, Lehman E, Leighton F, et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web//The 29th Annual ACM Symp on Theory of Computing,El Paso, 1997: 654-663.

[4] Godfrey B, Lakshminarayanan K, Surana S. Load balancing in dynamic structured P2P systems//The Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, 2004:2253-2262.

[5] Latze C. Roaming, accounting and seamless handover in EAP-TLS authenticated networks//Software, Telecommunications and Computer Networks,2008.

[6] Wu W T. Design and implementation of WIRE Diameter//The 3rd International Conference on Information Technology: Research and Education, 2005: 428-433.

[7] Knuth Donald E. Sorting and Searching trees
[M]//The Art of Computer Programming,New Tersey:Addison-wesley Professional,1973.

[8] Xie Nan-bin, Huang Xiang-dan. The mixed encryption algorithm based on MD5 and XOR transformation//Education Technology and Computer Science (ETCS), 2010:394-396.

[9] Hi W G, MacGregor M H, Gburzynski P. Load balancing for parallel forwarding
[J]. IEEE/ACM Trans on Networking, 2005,13(4): 790-801.

[10] 张晓明. 网络处理器设计的关键技术研究.长沙:国防科学技术大学,2006.

[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!