Method of autonomic load balancing for long polling in M2M service system

Shinji Kitagami, Yosuke Kaneko, Takuo Suganuma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

In a Machine-to-Machine (M2M) service system that connects devices to the internet and provides various remote services, the long polling communication method is effective as a communication protocol that satisfies requirements of both security and immediacy simultaneously. It sustains a communication session among devices and servers for a definite period. For this reason, when a medium server for load balancing is introduced into a large-scale M2M service system, it might cause a performance bottleneck. As described in this paper, we propose an autonomic control method to achieve load balancing and load leveling using only devices and servers, without introducing a medium server. This study estimates the proposed method by simulation, demonstrates its effectiveness, and derives the conditions of proper operation parameters.

Original languageEnglish
Title of host publicationProceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
Pages294-299
Number of pages6
DOIs
Publication statusPublished - 2012
Event26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 - Fukuoka, Japan
Duration: 2012 Mar 262012 Mar 29

Publication series

NameProceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012

Conference

Conference26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012
Country/TerritoryJapan
CityFukuoka
Period12/3/2612/3/29

Keywords

  • Immediacy
  • Large-scale System
  • Load Index
  • Load-Leveling
  • Low-cost Connectivity
  • Security

Fingerprint

Dive into the research topics of 'Method of autonomic load balancing for long polling in M2M service system'. Together they form a unique fingerprint.

Cite this