<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Critical analysis on load balancing algorithms in Cloud Environment</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Santosh</forename><surname>Kumar</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Sri Sri University</orgName>
								<address>
									<addrLine>Sri Sri Vihar, Ward No-3 Godi sahi</addrLine>
									<postCode>754006</postCode>
									<settlement>Cuttack</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sunil</forename><surname>Kumar Dhal</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Sri Sri University</orgName>
								<address>
									<addrLine>Sri Sri Vihar, Ward No-3 Godi sahi</addrLine>
									<postCode>754006</postCode>
									<settlement>Cuttack</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Critical analysis on load balancing algorithms in Cloud Environment</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">62F321C456BAE81BD1444A5CF557C56B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T00:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Active</term>
					<term>Throttled</term>
					<term>Response Time</term>
					<term>VM</term>
					<term>Internet</term>
					<term>throughput</term>
					<term>Biased</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Cloud computing is now growing as an emerging computing technology that enables user to avail the computing resources in the form of software, hardware, platform, database, communication, infrastructure working from own computer over internet. The main benefit of cloud computing technology is low cost, data backup, throughput, data privacy, security. To get started in cloud we need zero capital expenditure. The major benefit of cloud is you pay only for what you use. Load balancing in cloud environment is an essential operation. Due to increasing clients in cloud and computing services over internet, load balancing algorithms are essential in data centers. Many different types of algorithms are proposed by different researchers in different point of time. The central plan of load balancing algorithms is to dispense load between servers efficiently so that it improves task scheduling simultaneously with increasing system performance.</p><p>In this article, we have explained various load balancing algorithm's based on system state (static/Dynamic).We compared all these algorithms to find out the efficient algorithms depending on various parameters like throughput, response time, fault tolerance, resource utilization, power saving.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The term "cloud computing" refers to a technology where end users avail various computing services like hardware, software, platform, database, interface through internet <ref type="bibr" target="#b5">[6]</ref>. Cloud can be different types like public, private, hybrid, community. Cloud offers different types of services like software, platform, database. Various companies are providing cloud services in these three categories. Cloud can remove many limitations from the traditional computing environment including time, space and cost <ref type="bibr" target="#b11">[12]</ref>. The various characteristics of cloud are: This paper is structured into following sections: Section 2 gives an idea concerning different types of load balancing techniques. Section 3 explains the different existing algorithms implemented in the cloud environment. Section 4 gives a comparison of various load scheduling algorithms. Section 5 gives an overall ending of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Load Balancing</head><p>In cloud computing environment a field which has significant importance is load balancing on servers. Various algorithms are suggested by numerous researchers on load balancing. An important job of these algorithms is to allocate load efficiently between servers in such a means that, servers never be overloaded or underloaded. A key plan of most of the load scheduling algorithms is, to enhance the user happiness and maximum resource uses thus improves overall system performance. Load balancing algorithms can be classified on the basis of system state</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Static Load Balancing Algorithm</head><p>These algorithms assign task to nodes based on prior knowledge of nodes capability <ref type="bibr" target="#b0">[1]</ref>. These algorithms don't consider the dynamic load changes during execution time. Static load balancing algorithms never depends on networks current status.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Dynamic Load Balancing Algorithm</head><p>These algorithms works in the environment, where task is circulated between different virtual machines during execution time. It looks for the server having nominal load inside the network and after that assign proper load to it <ref type="bibr" target="#b1">[2]</ref>. Dynamic load balancing algorithms consider the present status &amp; traffic of systems. These algorithms well thought-out as difficult however enhanced typical throughput and fault tolerance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.1.">Policies of dynamic load balancing algorithm</head><p>Dynamic Load balancing algorithms contains 6 major policies <ref type="bibr" target="#b3">[4]</ref>:</p><p>• Transfer Policy: It is needed when any job must be shifted from one to other node.</p><p>• Selection Policy: Here importance is given for selecting right processor for load shift so that throughput &amp; response time might be increased. • Location Policy: It is the identification of critical resources for offering services and the selection of resource locations. • Information Policy: Here information linked to load regarding the node is acquired.</p><p>• Load Estimation Policy: Here total load of a node inside a system is calculated.</p><p>• Process Transfer Policy: Under this policy a process execution is determined whether it is locally or remotely.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Review</head><p>This section describes different existing load balancing algorithms based on probabilistic approach and soft computing approach. These approaches can be implemented in cloud environment.</p><p>• Round Robin algorithm Here a predetermined time slice is assigned to all virtual machines for executing a task <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b7">8]</ref>. After time slice over, again another virtual machine is given time slice for execution of job. In this way round robin algorithm gives time slice to each virtual machine for execution of task. Due to its uniform movement in a circular fashion some nodes are overloaded, while others are underloaded. It doesn't consider the current workload of the server.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Weighted Round robin algorithm</head><p>Here every virtual machine is allotted weightage depending on the capacity of virtual machines. As per the weightage assigned to the virtual machine, it would receive appropriate requests. In real time cloud computing environment it is very difficult to forecast the accurate execution time. Therefore this algorithm is not a good choice <ref type="bibr" target="#b8">[9]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Central manager algorithm</head><p>In the central manager algorithm, a node is treated as central manager node which selects a node which is least loaded depending on the server's current system load information <ref type="bibr" target="#b9">[10]</ref>. As all the servers update their load condition to central manager, this results to excess inter process communications so network congestion occurs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Active monitoring</head><p>This type of technique identifies information about each Virtual Machine and the amount of tasks presently allotted to each virtual machine. Whenever a new request for a Virtual Machine enters, it determines which Virtual Machine is the least loaded. Now the new request allocated to the least loaded VM. If number of virtual machines are more than one detected then by default the 1st one is selected. The main disadvantage of this algorithm is whether a VM is previously utilized or not because some VM's are over utilized and some are remain ideal.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Throttled load balancing algorithm</head><p>In this algorithm status of VM (idle/busy) is identified. At the load balancer, the data is saved in an index table. This algorithm find out appropriate VM for assignment of job. The job manager contains index list of VM's to find a machine so that it allot required job to the appropriate virtual machine <ref type="bibr" target="#b6">[7]</ref>. A disadvantage of these algorithm is, when all machines contains analogous hardware configurations it can only work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Threshold load balancing algorithm</head><p>Here 1 st it considers loading threshold of each server depending on its processing speed &amp; storage capacity. After that we choose a method to distribute the load among servers depending on the threshold. The threshold represents the storage percentage of every datacenter that should not be exceeded.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Opportunistic algorithm</head><p>This algorithm never thinks about the present workload of each Virtual machine's. it always try to maintain every node busy. The tasks are assigned randomly to the nodes. It is a slow process as it never calculate the present work load during run time of the node.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Min-Min algorithm</head><p>This algorithm chooses a number of unassigned tasks. Initially smallest completion time for al tasks is calculated. After that the task having less completion time is chosen for execution until all unassigned tasks are completed <ref type="bibr" target="#b2">[3]</ref>. The major disadvantage of the algorithm is some tasks are suffered with starvation problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Max-Min algorithm</head><p>Here it calculates smallest completion time of all tasks. Out of which the job having maximum execution time is allocated to the VM. Max -Min algorithm executes shortest jobs concurrently with longest jobs <ref type="bibr" target="#b10">[11]</ref>. The main drawback is, jobs having minimum execution time suffer starvation problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Randomized algorithm</head><p>This algorithm handles a node 'n' with probability 'p'. when processors are of equal load this algorithm works good. The major problem arises when loads are of different run time. It never shows deterministic approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Ant colony optimization</head><p>This algorithm resembles the activities of ants finding for food. It aims to find optimal solution .it is a random search algorithm . Ants are moving from their nest to find food join everyone by pheromone which is a volatile substance deposited on paths they travelled. The ant will reach near food by following the trace of pheromone. The concentration of pheromone may changes depending on many factors like the food quality source, distance from food. Now ants utilize the pheromone deposits so that to go to next node. The demerit of this algorithm is premature convergence and stagnating output.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Active clustering</head><p>In active clustering more than two servers united &amp; handle the network load and working as a team, they distribute it to the network servers. The load balancer keeps this information requests from users and store it in cache. This process minimizes network traffic load. Server clustering is a way of making multiple computer servers into a cluster, acts like a single server.</p><p>The disadvantage is it degrades as system diversity increases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Biased random sampling</head><p>This algorithm uses random sampling methods for load balancing between nodes. The nodes are selected which are servers. This algorithm uses virtual graph, where each side represents each node's load. All nodes are regarded as a directed graph's vertex. Now the node having minimum degree one assigned the task by load balancer. The server now execute the task showing the decrease of available free resources. Due to additional overhead when servers increases degrades the performance, is the biggest disadvantages of this algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Honeybee foraging</head><p>Honeybee Foraging is inspired by honeybee foraging habits. There are numerous varieties of honeybees, such as finders and reapers. Initially, the finders move around and look for honey sources. They return to the honey comb after discovering the source and begin a waggle dance to demonstrate the quantity and quality of honey present. Then after, reapers go out and collect honey from various locations <ref type="bibr" target="#b12">[13]</ref>. They perform a waggle dance and then return to harvest honey. The throughput is very less in this algorithm is the major disadvantage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Central queue</head><p>This algorithm stores newly arrived tasks &amp; unfulfilled requests in a FIFO queue in a cyclic manner. All the new tasks inserted in the queue by the queue manager. The Manager after finding a new request, it removes the first operation from the queue and delivers this to the user. When there are no activities within queue, it is considered empty. When a request is made, a new activity is buffered. The queue manager scans the queue for any unanswered requests, assigns a activity, and removes the first such request. When all remote servers are overloaded this algorithm assigned all processes locally, is the main disadvantages of this algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Weighted least connection</head><p>It is created on the principle of Least connection algorithm used for different application servers. Based on traffic handling capacity the administrator allocates weight to each server. The computational time is very high in this algorithm <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Particle swarm optimization</head><p>It is a stochastic optimization method works on the movement of intelligent swarms. Here for getting a solution from a problem social interaction is used. This algorithm uses many particles (agents) that forms a swarm moving around for search of space thus looking for best solution of a problem. Particle Swarm Optimization was proposed by Kennedy and Eberhart in 1995 <ref type="bibr">[15]</ref>. As mentioned in the original paper, sociobiologists believe a school of fish or a flock of birds that moves in a group "can profit from the experience of all other members" <ref type="bibr">[15]</ref>. The downsides of the algorithm are that it will be easy to slip into a local optimum in a highdimensional region and that the iterative approach has a slow rate of convergence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Least connection</head><p>Least connection algorithm is dynamic in nature. It considers least number of active connections for client requests distributed in the application server. This algorithm always takes number of active connections into consideration. Here the algorithm distributes load by choosing least number of active connections. The demerits are system is heavily loaded and performance is degraded.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>• Stochastic Hill climbing</head><p>Using a local optimization strategy, the allocation of arriving jobs toward servers or virtual machines is done via stochastic hill climbing. A stochastic and local optimization method is nothing more than a loop that travels uphill in the direction of increasing value. It comes to a halt when no neighbor has a better worth than it. The likelihood of selection varies with the steepness of the uphill motion in this form, which chooses at random from among the uphill moves. As a result, by making slight adjustments to the original assignment, it maps assignments to a collection of assignments. Each member of the set is assessed against a set of criteria in order to get closer to a valid assignment and enhance the state's evaluation score.</p><p>The following assignment is given to the set's best element. This basic operation is continued until a solution or a stopping requirement is met. The disadvantages of the hill climbing algorithm include the fact that it is totally centralized and only run through one mode, resulting in a bottleneck as well as a failure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Findings of various load balancing algorithms</head><p>This section gives an idea on different existing load balancing algorithms based on various factors. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Acknowledgements</head><p>Load balancing <ref type="bibr" target="#b0">[1]</ref> is considered as a vital work within cloud environment for best deployment of cloud resources .Due to the proper load balancing approach the data centers can manage VM's efficiently. We have described and performed comparative analysis of a range of load balancing algorithms along with their static or dynamic nature based on different parameters like fault tolerance ,throughput, response time, resource utilization. After analyzing algorithm based on various parameters we found that static algorithms are stable in comparison to dynamic .However dynamic load balancing algorithms <ref type="bibr" target="#b0">[1]</ref> are preferred choice compared to static as it considers the present workload of the servers. From the above observation by considering various parameters we found that , Ant colony algorithm, honey bee foraging algorithm , central queue algorithms are better in fault tolerance approach where as Round robin, Weighted round robin, Min-min, max-min are better in throughput, resource utilization and response time. During our subsequently future effort we must compare algorithms having simulation work and mathematical investigation on various additional parameters to determine the best algorithm on load balancing in cloud environment.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>•</head><label></label><figDesc>Elasticity nature of cloud • Self service provisioning of cloud technology • API's • Billing &amp; metering of service usage in a pay-as-you-go.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="6,73.50,211.63,414.90,392.54" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table - 1</head><label>-</label><figDesc>explains different types of load balancing techniques (static, Dynamic) with different parameters used for load balancing. Different parameters like Fault tolerance, Migration time, Network overhead, Adaptability, Scalability, Throughput, Resource utilization, Response time, Power Saving, Reliability, Predictability, Process Migration, performance.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>Findings of various load balancing algorithms</figDesc><table /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A survey of load balancing in cloud computing: Challenges and algorithms</title>
		<author>
			<persName><forename type="first">Al</forename><surname>Nuaimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Mohamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Al Nuaimi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Jaroodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">second symposium on network cloud computing and applications</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012. 2012</date>
			<biblScope unit="page" from="137" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Pros and cons of load balancing algorithms for cloud computing</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ghutke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Shrawankar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Information Systems and Computer Networks (ISCON)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="123" to="127" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Features exploration of distinct load balancing algorithms in cloud computing environment</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dixit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Dev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Advanced Networking and Applications</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="4177" to="4183" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Various dynamic load balancing algorithms in cloud environment: a survey</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Rana</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">129</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="975" to="8887" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A survey of various load balancing algorithms in cloud computing</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kashyap</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Viradiya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Sci. Technol. Res</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="115" to="119" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Execution analysis of load balancing algorithms in cloud computing environment</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ray</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>De Sarkar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Cloud Computing: Services and Architecture (IJCCSA)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1" to="13" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A state-of-art load balancing algorithms in cloud computing</title>
		<author>
			<persName><forename type="first">R</forename><surname>Ramya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kriushanth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Arockiam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Applications</title>
		<imprint>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="issue">19</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Comparative Study of Load Balancing Algorithms in Cloud Computing Environment</title>
		<author>
			<persName><surname>Meenakshi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of engineering research &amp; technology (IJERT)</title>
		<imprint>
			<biblScope unit="volume">02</biblScope>
			<biblScope unit="page">10</biblScope>
			<date type="published" when="2013-10">October 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Comparative study on load balancing techniques in distributed systems</title>
		<author>
			<persName><forename type="first">Beaulah</forename><surname>Soundarabai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Thriveni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Venugopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">R</forename><surname>Patnaik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">nternational Journal of Information Technology and Knowledge Management</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="53" to="60" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A comparative performance analysis of load balancing algorithms in distributed system using qualitative parameters</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Rajguru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Apte</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Recent Technology and Engineering</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="175" to="179" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">An in-depth analysis and study of Load balancing techniques in the cloud computing environment</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">G</forename><surname>Gopinath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Vasudevan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="page" from="427" to="432" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Cloud-based zero trust access control policy: an approach to support workfrom-home driven by COVID-19 pandemic</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mandal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">New Generation Computing</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="599" to="622" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Nature inspired meta-heuristic algorithms for solving the load-balancing problem in cloud environments</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">T</forename><surname>Milan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Rajabion</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ranjbar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Navimipour</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Operations Research</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<biblScope unit="page" from="159" to="187" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A Load-Balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of Connections</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shuang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Artificial Intelligence and Security</title>
				<meeting><address><addrLine>, Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021-07">2021. July</date>
			<biblScope unit="page" from="563" to="574" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Load balancing in cloud computing: a state of the art survey</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mesbahi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Rahmani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Mod. Educ. Comput. Sci</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">64</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
