Professional Documents
Culture Documents
Fuzzy-Logic Based Self Adaptive Grid Architecture
Fuzzy-Logic Based Self Adaptive Grid Architecture
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 184
Fuzzy-Logic Based Self Adaptive Grid
Architecture
Ashiqur Md. Rahman, Roksana Akter, and Rashedur M Rahman
AbstractGrid computing is a framework to meet the growing computational demands and offers the network of large scale
computing resources. This paper presents a survey to generalize the fuzziness in various sectors of Grid computing and
summarize research challenges. The Fuzzy Grid improved the efficiency of probabilistic interpretation of several Grid features.
Not all the Grid architectures provide same benefits for users in utilizing the resources. A thorough overview of Fuzzy-logic
based self adaptive Grid architecture with secure fault tolerant job scheduling, file replication and intelligent routing is studied in
this survey.
Index Termscaching, fuzzification, particle, path goodness, route goodness, security demand, trust index.
1 INTRODUCTION
RID computing [1] is an emerging technology that
focus on uniformly aggregating and sharing distri
buted heterogeneous collection of autonomous sys
tems, resources geographically distributed and intercon
nected by low latency and high bandwidth networks for
solving largescale applications in science, engineering
and commerce [2]. In a largescale grid, distributed re
sources belong to different administrative domains. Data
Grids provides infrastructure for whom accessing, trans
ferringandmanaginglargedatasetsstoredindistributed
repositories [3][4] that leads to a more decentralized ap
proach to address the problem of computing power. Re
search driven by this has promoted the exploration of a
new architecture known as The Grid for high perfor
mancedistributedapplicationsystem.ThetermGridis
driven from an analogy to the electrical power supply in
thesensethatithaspervasiveaccesstothepowerandcan
draw any resources from the distributed resource pool.
Thus, a household draws electricity from power sockets
irrespective of their physical location and the location of
accesspoints[5].
Grid computing can coordinate resource sharing and
problem solving across dynamic multiinstitutional envi
ronments. High performance Grid architectures facilitate
these requirements by applying the various technologies
required in a coordinated fashion to support data inten
sivepetabytescaleapplication.Thispaperdiscussesvari
ous methods of using fuzzy logic in different sector of
Grid architecture. Fuzzy logic [6] has been successfully
applied to many areas such as control, scheduling, repli
cationetc.Thedevelopmentoffuzzygridsysteminvolves
acquiringIFTHENrulesthroughcongregationtheexpert
autonomous grid system.A key motivation of this paper
istoaggregatetheavailablefuzzytechnologiesandmore
importantlythetheoryoffuzzinesstoarticulateaFuzzy
Gridinfrastructure.Classicalexpertsystemsemulatethe
reasoning process on a static trusted Grid environment.
However, the method of handling imprecision must be
excellent for an expert system to measure the natural
probabilistic perception accurately. This new feature is
achievable into the Grid architecture by introducing fuz
ziness. The major areas for implementing fuzziness on
Grid computing are, fuzzy trust integration for security
enforcement on Job Scheduling using Particle Swarm
algorithm, NeuroFuzzy hybrid negotiation model for
resource allocation, and Fuzzy Replica Placement Strate
gies,etc.
Heterogeneous data sources, most of the grid services
thatareavailablearedesignedsuchawaythattheymust
be identical in schema definition for their smooth opera
tion whereas there can be situation where the grid sites
arealsoheterogeneous.Soitisimportantforsuchhetero
geneous distributions of data are to be classified with
maximumsatisfactionwithrespecttoallconstraints.Sec
tion 2 describes the grid architecture forwarded with
fuzzy trust integrated fault tolerant grid architecture for
security enforcement on resource allocation in Section 3.
Section4illustratestheoptimizationofgridresourceallo
cation using NeuroFuzzy hybrid negotiation model.
Fuzzyreplicareplacementalgorithmforoptimizingaver
ageresponsetimeisexplainedinSection5.Fuzzyrouting
tuneup for dynamic maintainability is discussed in Sec
tion 6. Section 7 contains conclusion and provide future
direction.
Motivation of this work is to generalize fuzzy grid
conceptandhighlightongoingresearchinthisemerging
area. XMLbased technologies are involving in interope
rability issues, whereas we are finding some concepts by
which we can provide common specifications on fuzzy
grid.
- Ashiqur Md. Rahman is with the Department of Electrical Engineering &
Computer Science, North South University, Bangladesh.
- Roksana Akter is with the Department of Computer Science & Engineer-
ing, University of Dhaka, Bangladesh.
- Rashedur M. Rahman is with the Department of Electrical Engineering &
Computer Science, North South University, Bangladesh.
G
2011 Journal of Computing Press, NY, USA, ISSN 2151-9617
http://sites.google.com/site/journalofcomputing/
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 6, JUNE 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 185
2 GRID ARCHITECTURE
Grid architecture continues to evolve as the overall
design concepts continue to improve and as it is em
ployedforadditionaltasks.However,becauseGridarchi
tecture is highly flexible, Grids have also been adopted
for use by many other, less computationally intensive,
application areas. Today, many types of Grids exist, and
newGridsarecontinuallybeingdesignedtoaddressnew
informationtechnologychallenges.Gridscanbeclassified
invariousways,forexamplebyqualitiesofphysicalcon
figuration, topology, and locality. Grids within an enter
prisearecalledintragrids,interlinkedGridswithinmul
tiple organizations are called intergrids and Grids exter
nal to an organization are called extragrids. Grids can
have a small or large special distribution, i.e.,distributed
locally, nationally or worldwide. Grids can also been
classified by their primary resources and function, for
example computational Grids provide for high
performance or specialized distributed computing. Grids
can provide modest scale computational power by inte
gratingcomputingresourcesacrossanenterprisecampus
or largescale computation by integrating computers
acrossanationsuchastheTeraGridintheUSA[3].
Thebreadthandextensibilityofmultipleheterogene
ous resource types motivate the creation of the multi
tiered architecture shown in Fig. 1. The first tier contri
butes a virtualization layer. The virtualization function is
specific to each resource type and wraps around each
resource instantiation given a resource type. For ease of
programming, the ensuing logical representation for a
resource is typically first supported by companion off
theshelfsoftwareconstructs.
=
( S
i
c
i]
q
i
)
q
i
]=1
n
i=1
c
i]
q
i
q
i
]=1
n
i=1
(8)
HereeijExpectedtimetocomputewhenscheduletaskti
to host mj. The estimated expected task execution times
oneachmachineareknowninthegridsites.Theassump
tion is commonly made when studying scheduling prob
lems for grids or Heterogeneous Computing (HC) sys
tems [17], [18], [19] and qi refers the number of hosts
thatsatisfySDTLfortaskti.ThejobSDissuppliedby
the user programs as a single parameter only. The trust
index is normalized as a single number real number with
0representingtheconditionwithhighestriskatasiteand
1 representing the condition which is totally riskfree or
fullytrusted.TIiscomputedas(9).
II
=
II
]
P
]
m
]=1
P
]
m
]=1
(9)
Herethepjisthespeedofhostmj(MFlops).Thevariation
oftheTIofaresourcesitedependsuponsuccessrateand
site defense capability. The trust index increases with the
increase of both contributing factors helps to allocate re
sourceswithhighdegreeofsecurityassurance.Thefuzzy
inferenceisdoneformatchmakingbyfourstapes:fuz
zification,inference,aggregationanddefuzzification[21].
Trust model could deduce detailed security features to
guidethesitesecurityandupdateasaresultoftuningthe
fuzzysystem.Fuzzyrulesextractionfromnumericaldata
directly for function approximation is used to tune the
fuzzysystem[22].
Each SeGO agent contains a resource manager and a
trust manager. The resource manager maintains resource
status and monitor job execution. The trust manager as
sesses sites trust index through fuzzy inference system.
In this architecture the resource manager maintains its
own trust vector, which is updated periodically. The Dis
tributed Hash Table (DHT) offers a fast hashing protocol
to exchange critical information in the trust integration
process. The whole Grid is described by a trust matrix
defined by an m m square matrix M = (V1, V2, V3, ,
Vm),thetrustvectormaintainedatsiteSjisdonatedbyVj
= (t1j, t2j, , tmj) where j m which represents the trust
indexofsiteSjwithallavailablesite.
This model applies two levels of trust inference: the
lower level fuzzy inference system collects all input pa
rametersfromasinglesite,thuscalledintrasitelevel.The
output of the intrasite level provides the inputs to the
upper level. The upper level collects inputs from all re
source sites, thus called intersite level. There are two
fuzzy inference systems applied in the intrasite level.
One evaluates the selfdefense capabilityA, and the other
one evaluates the site reputationu. Each site reports its
assessed selfdefense capability to all other sites. There is
only one fuzzy inference system at the intersite level,
whichcollectsinputsfromintrasitelevels,andinfersthe
sitetrustindicestoformthetrustvectorforeachsite.The
intersite fuzzy inference process using five steps is sum
marized inAlgorithm 1.All selected rules are inferred in
parallel. Initially, the membership is determined by as
sessing all terms in the premise. The fuzzy operator
AND is applied to determine the support degree of the
rules. The AGGREGATE superimposes two AND re
sultscurveswhichisfollowedbydefuzzification.
Thereismanyotherfuzzyinferencerulesthatcanbe
designed using various combination of the fuzzy va
riables considered. The fuzzy rule extraction method de
velopedbyAbeandLan[22]toderiverulesfromnumeri
cal data is used into fuzzy trust system. Fuzzy trust sys
tem needed to be tuned to satisfy the securityassurance
index.
Algorithm1:Intersitefuzzyinferenceprocedure
1. Calculate site reputation , and obtain the reported
selfdefensecapability;
2. Useandsmembershipfunctionstogeneratethe
membershipdegreesforand;
3. Applythefuzzyruleset,mapthespacetoTI
spacethroughfuzzyAND,ORandIMPLYoper
ations;
4. Aggregatethefuzzyoutputsfromallrules;
5. Derive the trust indexs numerical value through a
defuzzificationprocess
Fig. 4. Fuzzy logic inference between job success rate u and self-
defense capability A to induce the trust index I of a resource site.
Fig. 8. Membership function of the variable (a) Size (b) Time (c) Fre-
quency and (d) Replication
6 FUZZY ROUTING
Toexchangecriticalinformation,amongtheuserand
the grid site, GridSim simulator uses java socket pro
gramming over TCP/IP network model. Efficient routing
in communication network is becoming increasingly dif
ficultduetotheincreasingsize,rapidlychangingtopolo
gy and complexity of communication network. The com
plexity involved in the networks may require the consid
eration of multiple constraints to make the routing deci
sion. A novel approach named FLAR (Fuzzy Logic Ant
based Routing) inspired by swarm intelligence and en
hanced by fuzzy logic technique as adaptive routing that
allows multiple constraints to be considered in a simple
andintuitiveway[35].
In the AntNet algorithm, routing is determined
through complex interactions of network exploration
agents, called ants. These agents are divided into two
classes, the forward ants and the backward ants. The idea
behind this subdivision of agents is to allow the back
ward ants to utilize the useful information gathered by
the forward ants on their trip from source to destination.
Basedonthisprinciple,nonoderoutingupdatesareper
formedbytheforwardants,whoseonlypurposeinlifeis
to report network delay conditions to the backward ants.
This information appears in the form of trip times be
tween each network node. The backward ants inherit this
raw data and use it to update the routing tables of the
nodes. The detailed information about different versions
ofAntNetalgorithmscanbefoundin[36].
FLAR is constructed with the communication model
observed in ant colonies and fuzzy logic technique. The
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 6, JUNE 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 193
FuzzyInferenceSystem(FIS)forFLARisamamdanitype
system with two inputs and one output. The system in
puts are route (or link) delay and route utilization. The
both inputs are characterized by the fuzzy membership
functionsasshowninFig.9.andFig.10.Themembership
functionsforthefuzzysetsofinputsarechosentobetri
angular.Bothofinputsarenormalizedbetween(0,1)be
foreapplyingtoFIS.AsshowninFig.9andFig.10,both
input variables route delay and utilization have five
membership functions titled as VL, L, M, H, and VH
which mean Very Low, Low, Medium, High, and Very
Highrespectively.
Fig. 9. Membership function of Link Delay (X1).
Fig. 10. Membership function of Link Utilization (X2).
The rules of the FIS are designed for an optimal per
formance.Table1showsrulebasefortheFIS.Inthistable
the Values for the amount of goodness from lowest to
highestaredefinedasLL(VeryLow),LM,LH,ML,MM
(Medium),MH,HL,HM,andHH(VeryHigh).
TABLE 1
RULE BASE FOR FIS
RouteGoodness
RouteUtilization(%)
VL L M H VH
Route
Delay
(ms)
VL HH HM HL MH MM
L HM HL MH MM ML
M HL MH MM ML LH
VL HH HM HL MH MM
L HM HL MH MM ML
M HL MH MM ML LH
H MH MM ML LH LM
VH MM ML LH LM LL
TheoutputofFISwhichisroutegoodnessisapplied
to the software simulation for evaluations. Design of
Fuzzy Inference System is the process of formulating the
mapping from a given input to an output using fuzzy
logic.
The defuzzification is the process of conversion of
fuzzy output set into a single number. The method used
for the defuzzification is, mean of centers as shown in
(11).Then,theoutputoffuzzysystemafterdenormaliza
tion is applied to the FLAR algorithm as the
Route_Goodnesswhichcanbeusedasacriterionforgood
Potb_0ooJncss
],d
n
(t)
= (1 -)Potb_0ooJncss
],d
n
(t -1) (12)
Whereisthelearningrate.TheestimationPath_Good
ness
n
j,d which means the amount of goodness to go from
node n to destination d via neighbor node j, is ex
pressedinequation(13).ThisequationstatesthatnPath_
Goodnessj,disthesumofallRoute_Goodnessvaluesofthe
traversed links in the path that are obtained by equation
(11).
Potb_0ooJncss
],d
n
= Routc_0ooJncss
I
I+1
t
I=1
(13)
P
],d
n
(t) =
|
1
PATH_GOODNESS
],d
n
(t)
|
|
1
PATH_GOODNESS
],d
n
(t)
|
l
(14)
WhereleNeighbor(n).Theadvantagesofsuchanintelli
gent algorithm include increased flexibility in the con
straints that can be considered in making the routing de
cisionefficientlyandthesimplicityintakingintoaccount
multipleconstraints.
The fuzzy control ant routing system shows better
performancethanOSPF.Sothisnovelapproachindicates
an encouraging characteristic for dynamic netmesseging
infuzzyGridenvironment.
7 CONCLUSION
The vision of this survey is to make Fuzzy Grid more
comprehensive. We try to come up with some common
features which are desirable for assembling Fuzzy Grid.
As the problem is not trivial, there are lots of factors in-
side, if we really want to establish our arguments of this
paper. Here we highlight the most popular contributions
in this area with the motivation to provide a generic plat-
form to work with a complete fuzzy system of Grid com-
puting environment.
The Grid sites do not share a common memory or the
computing capability among themselves even if the site
remains inoperative. Distributed service Grid manage-
ment architecture [37] is capable of performing auto-
mated resource-to-service assignations. Divisible load
balancing among the sites using parallel algorithm is our
future focus.
REFERENCES
[1] I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the
grid: enabling scalable virtual organization, International Jour-
nal of High Perfromance Computing Application, vol. 15, pp. 200-
222, 2001
[2] I.Foster,C.Kesselman,andS.Tuecke,TheGrid:Blueprintfor
a new computing infrastructure, Morgan Kaufmann Publisher,
SunFrancisco(USA),1999
[3] A. Chervenak, I. Foster, C. Kesselman, C. Salisbury and S. Tu
ecke, The data grid: Towards an architecture for the distri
buted management and analysis of large scientific datasets,
Journal of Network and Computer Applications, vol. 23, pp. 187
200,2001
[4] W.Hoschek,F.Janez,A.Samar,H.Stockinger,andK.Stocking
er, Data Management in an International Data Grid Project,
1
st
International Workshop on Grid Computing (GRID), India, De
cember,2000.(Conference proceedings)
[5] I. Foster, C. Kesselman, and C. Globus, A toolkitbased Grid
architecture, pp. 259278, Morgan Kaufmann Publisher, Sun
Mateo,CA(USA),1999
[6] www.teragrid.org,2002
[7] B.Aiken,J.Strassner,B.Carpenter,I.Foster,C.Lynch,J.Mam
bretti, R. Moore, and B. Teitelbaum, Network Policy and Ser
vices:AReportofaWorkshoponMiddleware,IETFRFC2768,
2000
[8] B. Carpenter, Architectural Principles of the Internet, RFC
1958,1996
[9] R. Buyya, and M. Murshed, GridSim:A Toolkit for Modeling
and Simulation of Distributed Resource Management and
SchedulingforGridComputing,ConcurrencyandComputation:
Practice and Experience (CCPE), vol. 14, pp. 1175 1220, Wiley
Press,2002
[10] A.Sulistio,G.Poduvaly,R.Buyya,and C.Than, Constructing
a grid simulation with differentiated network service using
GridSim, 6
th
International Conference on Internet Computing, Las
Vegas,USA,2005.(Conference proceedings)
[11] A. Sulistio, U. Cibej, S. Venugopal, B. Robic, and R. Buyya, A
toolkit for Modeling and simulating Data Grids: An extension
to GridSim, Concurrency & Computation: Practice & Experience,
vol.2.02,JohnandWiley&Sons,2002
[12] J. Kennedy, and R. Eberhart, Swarm Intelligence, Morgan
Kaufmann,2001
[13] A. Abraham, L. Hongbo, Z. Weishi, C. TaeGyu, Schediling
Jobs on Computational Grids Using Fuzzy Particle Swarm Al
gorithm.,LNAI4252,pp.500407,Springer,2006
[14] S. Song, K. Hwang, and Y. Kwok, Trusted Grid Computing
with Security Binding and Trust Integration, Journal of Grid
Computing,Springer,2005
[15] M. Humphery, and M.R. Thompson, Security Implications of
Typical Grid Computing Usages Scenarios, Proceedings of
HPDC,August2001.(Conference proceedings)
[16] S. Hwang, and C. Kesselman, A Flexible Framework for Fault
Tolerance in the Grid, Journal of Grid Computing, vol. 1, no. 3,
pp.251272,2003
[17] T.D. Braun, D. Hensgen, R. Freund, and R. Siegel, A compari
son of eleven static heuristics for mapping a class of indepen
denttasksontoheterogeneousdistributedcomputingsystems,
Journal of Parallel Distributed Computing, vol. 61, pp. 810837,
2001
[18] J. Kim, S. Shivle, and H.J. Siegel, Dynamically mapping tasks
withprioritiesandmultipledeadlinesinaheterogeneousenvi
ronment, Journal of Parallel Distributed Computing, vol. 67, pp.
154169,2007
[19] H. Zhao, and R. Sakellariou, Scheduling multiple DAGs onto
heterogeneous systems, 20
th
International Parallel and Distri
buted Processing Symposium, pp. 114. IEEE Press, Piscataway
2006.(Conference proceedings)
[20] www.eu-datagrid.org, 2003
[21] B.Kosko,FuzzyEngineering,PrenticeHall,1997
JOURNAL OF COMPUTING, VOLUME 3, ISSUE 6, JUNE 2011, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 195
[22] S.Abe, and M. Lan, Fuzzy Rule Extraction Directly from Nu
merical Data fro Function Approximation. IEEE Trans. On
SMC,vol.25,pp.119129,1995
[23] A. Marcos Dias de Assuno, Example of Use of the Auction
Framework for Gridsim, Grid Computing and Distributed Sys
temsLaboratory,Australia,(http://www.gridbus.org),2001
[24] Fipa Dutch Auction Interaction Protocol Specification. FIPA
Foundation for Intelligent Physical Agents, (http://www.fipa.org/),
2001
[25] Fipa English Auction Interaction Protocol Specification. FIPA
Foundation for Intelligent Physical Agents, (http://www.fipa.org/),
2001
[26] L. Mingbiao, C. Xinmeng, J. Feng, and W. Zhijian, Optimiza
tionofGridResourceAllocationCombiningFuzzyTheorywith
Generalized Assignment Problem, 6
th
International Conference
on Grid and Cooperative Computing (GCC 20070), IEEE 2007.
(Conference proceedings)
[27] S. Yexin, C. Mianyun, and Z. Zhisong, Fuzzy Hungary algo
rithmforsolvingthemultiobjectgeneralizedassignmentprob
lem,JournalofNavalUniversityofEngineering,vol.5,pp.7794,
2000
[28] K. Shahidul, NeuroFuzzy Hybrid Negotiation Model for In
telligent Agents in an Electronic Marketplace, 3
rd
International
Conference on Materials for Advanced Technologies (ICMAT), 2005.
(Conference proceedings)
[29] D. Zeng, and K. Sycara. Benefit of learning negotiation,
AAAI,1997.(Conference proceedings)
[30] S. Hakami, Optimum location of switching centers and the
absolutecentersandmediansofagraph,OperationResearch,
vol.12,pp.450459
[31] R.M Rahman, K. Barker, and R. Alhajj, Replica Placement on
Data Grid: Considering Utility and Risk, IEEE International
ConferenceonCodingandComputing(ITCC),2005
[32] R.MRahman,K.Barker,andR.Alhajj,Replica Placement De
sign with Static Optimality and Dynamic Maintability,
IEEE/ACM International Symposium on Cluster Computing and
Grid(CCGrid),2006.(Conference proceedings)
[33] K.Shahidul,A.M.Rahman,andA.K.Azad,DiscoveringMod
elsfromEventBasedDataBasisonaSurveyofIssuesandAp
proaches, 2
nd
International Conference on Web & Semantic Tech
nology(WeST2010),Springer,2010
[34] M.Calzarossa,andG.Valli,AFuzzyAlgorithmforWebCach
ing,SocietyforComputerSimulation,vol.35,pp.630636,1999
[35] S.J.Mirabedini,M.Teshnehlab,andA.M.Rahmani,FLAR:An
Adaptive Fuzzy Routing Algorithm for Communications Net
works Using Mobile Ants, International Conference on Digital
ObjectIdentifier,ConvergenceInformationTechnology,pp.1308
1315,2007
[36] G. Di Caro, and M. Dorigo, Distributed reinforcement agents
foradaptiveroutingin communicationnetworks,3
rd
European
WorkshoponReinforcementLearning,Rennes,France,1997
[37] T.Pieter,V.Bruno,andD.L.Marc,ResourcePartitioningAlgo
rithms in a Programmable Service Grid Architecture, LNCS
3516,pp.250258,Springer,2007
Ashiqur Md. Rahman received his B.Sc. Degree in Computer
Science and Engineering from American International University
Bangladesh, Dhaka in January, 2004. He is currently perusing his
M.Sc. degree from North South University, Dhaka since January
2006. He has authored in 5 national and international journal and
conference papers in the area of Data Mining, VHDL, Cryptography
and PVc module design. His current research interest is in Grid
Computing especially in large Grid Environment.
Roksana Akter obtained the degree of Master of Science (M. Sc.)
and Bachelor of Science (B. Sc.) in Computer Science and Engi-
neering from the University of Dhaka, Bangladesh in 2004 and 2003
respectively. She is currently working as a senior lecturer in the de-
partment of Computer Science and Engineering, Southeast Universi-
ty, Dhaka, Bangladesh. Her current research interest is in computer
networks, network simulators, MANET, digital systems, data com-
munications, cryptography, information security and published seven
research papers in national and international journals and confe-
rence proceedings.
Rashedur M. Rahman received his Ph.D. Degree in Computer
Science from University of Calgary, Canada in November, 2007. He
has received his M.Sc. degree from University of Manitoba, Canada
in 2002 and Bachelor degree from Bangladesh University of Engi-
neering and Technology (BUET) in 2000 respectively. He is currently
working as an Assistant Professor in North South University, Dhaka,
Bangladesh. He has authored more than 25 international journal and
conference papers in the area of parallel, distributed, grid computing
and knowledge and data engineering. His current research interest is
in data mining especially on financial, educational and medical sur-
veillance data, data replication on Grid, and application of fuzzy logic
for grid resource and replica selection.