CASViD: Application Level Monitoring for SLA Violation Detection in Clouds
|
|
|
- Scott Holt
- 9 years ago
- Views:
Transcription
1 CASViD: Application Level Monitoring for SLA Violation Detection in Clouds Vincent C. Emeakaroha Vienna University of Technology, Vienna, Austria Tiago C. Ferreto PUCRS, Faculty of Informatics, Porto Alegre, Brazil Marco A. S. Netto IBM Research, Sao Paulo, Brazil Ivona Brandic Vienna University of Technology, Vienna, Austria Cesar A. F. De Rose PUCRS, Faculty of Informatics, Porto Alegre, Brazil Abstract Cloud resources and services are offered based on Service Level Agreements (SLAs) that state usage terms and penalties in case of violations. Although, there is a large body of work in the area of SLA provisioning and monitoring at infrastructure and platform layers, SLAs are usually assumed to be guaranteed at the application layer. However, application monitoring is a challenging task due to monitored metrics of the platform or infrastructure layer that cannot be easily mapped to the required metrics at the application layer. Sophisticated SLA monitoring among those layers to avoid costly SLA penalties and maximize the provider profit is still an open research challenge. This paper proposes an application monitoring architecture named CASViD, which stands for Cloud Application SLA Violation Detection architecture. CASViD architecture monitors and detects SLA violations at the application layer, and includes tools for resource allocation, scheduling, and deployment. Different from most of the existing monitoring architectures, CASViD focuses on application level monitoring, which is relevant when multiple customers share the same resources in a Cloud environment. We evaluate our architecture in a real Cloud testbed using applications that exhibit heterogeneous behaviors in order to investigate the effective measurement intervals for efficient monitoring of different application types. The achieved results show that our architecture, with low intrusion level, is able to monitor, detect SLA violations, and suggest effective measurement intervals for various workloads. Index Terms Service Level Agreement, Application Monitoring, Cloud Resource Provisioning, SLA Management I. INTRODUCTION Cloud computing facilitates on-demand and scalable resource provisioning as services in a pay-as-you-go manner [10] thereby making resources available at all times from every location. Like in other business engagements, resource and service provisioning in Clouds are based on Service Level Agreements (SLAs), which are contracts signed between providers and their customers detailing the terms of the provisioning including non-functional requirements, such as Quality of Service (QoS) and penalties in case of violations [10], [14]. To establish Cloud computing as a reliable state of the art form of on-demand computing, Cloud providers have to offer scalability, reliable resources, competitive prices, and minimize interactions with the customers in case of failures or environmental changes. However, ensuring SLA for different Cloud actors at different layers (i.e. resource, platform, and application) is not a trivial task, especially for the application layer. Monitoring at this layer is necessary as several applications may share the same VMs (e.g. to reduce energy consumption and cost) or one application may run on multiple VMs (e.g. large scale distributed or parallel applications). Although a large body of work considers the development of reliable Cloud management infrastructures [7], [], [5], there is still a lack of efficient application monitoring infrastructures capable to adequately monitor and detect SLA violations of different customer applications. Besides application monitoring, determination of the effective monitoring interval for applications executing on the same host is still an open research challenge. This paper proposes CASViD (Cloud Application SLA Violations Detection) architecture for efficient monitoring and SLA violation detection at the application provisioning layer in Clouds. Its core component is the application-level monitor, which is capable of monitoring application metrics at runtime to determine their resource consumption behaviors and performance. The main contributions of this paper are: (i) the conceptual design of the application monitoring techniques, (ii) the build-up, design, and integration of the CASViD components, (iii) description of the implementation choices for the proposed architecture, (iv) presentation of an algorithm for investigating the effective measurement interval for monitoring of different application types, and evaluation of the CASViD architecture in a real Cloud testbed using heterogeneous applications. The rest of the paper is organized as follows: Section II presents the related work. In Section III, we describe the design of the CASViD architecture and give details of its components. Furthermore, we illustrate an example of how the architecture can be used to automatically determine the effective measurement interval to detect SLA violations. Section IV
2 presents the implementation decisions for the architecture and Section V discusses the experimental evaluations. We present the conclusions and future work in Section VI. II. RELATED WORK We divide the related work into two categories (i) monitoring strategies [3] [6], [13], [17], [31], [3], and (ii) SLA management including violation detection [7], [14], [15], [0], [], [5]. In the analysis of the existing work in this area, we consider also Grid and service-oriented based systems, since they are related areas to Cloud computing. Balis et al. [5] propose an infrastructure for Grid application monitoring. Their approach is based on OCM-G, which is a distributed monitoring system for obtaining information and manipulating applications running on the Grid. They aim to consider Grid-specific requirement and design a suitable monitoring architecture to be integrated into the OCM-G system. However, their approach considers only Grid specific applications. Bubak et al. [6] discuss the monitoring of Grid applications with Grid-Enabled OMIS monitor, which provides a standardized interface for accessing services. In their approach, they described the architecture of the system and provides some design details for the monitoring system to fit well in the Grid environment and support monitoring of interactive applications. Their monitoring goal is focused toward application development and they do not consider detecting application SLA violations. Kacsuk et al. [4] propose application monitoring in Grid with GRM and PROVE, which were originally developed as part of the P-GRADE graphical program development environment running on Clusters. In their work, they showed how they transformed GRM and PROVE into a standalone Grid monitoring tool. However, their approach does not consider finding effective measurement intervals. Balaton et al. [3] discuss resource and job monitoring in the Grid. They presented a monitoring architecture with advanced functions like actuators and guaranteed data delivery. Their motivations toward application monitoring are to understand its internal operations and detect failure situations. They do not consider the monitoring of application resource consumption behaviours. Emeakaroha et al. [17] propose DeSVi, an architecture for monitoring and detecting SLA violation at Cloud infrastructure layers. But, they do not consider monitoring and detection of SLA violations at Cloud application layer. Clayman et al. [13] present Lattice framework for Cloud service monitoring in the RESERVOIR EU project. It is capable of monitoring physical resources, virtual machines and customized applications embedded with probes. Compared to our approach, the Lattice framework is not generic because its application monitoring capabilities are restricted to applications preconfigured with probes and it does not consider measurement intervals in its operation. Ferrer et al. [0] present fundamentals for a toolkit for service platform architectures that enable flexible and dynamic provisioning of Cloud services within the OPTIMIS EU project. The focus of the toolkit is aimed at optimizing the whole service lifecycle including service construction, deployment, and operation. It does neither detail the application monitoring strategy nor consider the determination of effective measurement intervals. Rak et al. [31] propose Cloud application monitoring using the mosaic approach. In a first step, the authors describe the development of customized applications using mosaic API to be deployed on Cloud environments. For these applications, they propose in a second step some monitoring techniques. Their interest is only to gather information that can be used to perform manual or automatic load-balancing, increase/decrease the number of virtual machines or calculate the total cost of application execution. Their approach does not consider the detection of SLA violations to avoid SLA penalty cost and moreover, it is not generic since it monitors only applications developed using the mosaic API. Shao et al. [3] present a performance guarantee for Cloud applications based on monitoring. The authors extract performance model from runtime monitored data using data mining techniques, which is then used to adjust the provisioning strategy to achieve a certain performance goals. They do not consider finding effective measurement intervals. Boniface et al. [7] discuss dynamic service provisioning using GRIA SLAs. They describe service provisioning based on SLAs to avoid violations. But, their approach does not consider monitoring of multiple applications on a single host. Koller et al. [5] discuss autonomous QoS management using a proxy-like approach. Their implementation is based on WS- Agreement. Thereby, SLAs can be exploited to define certain QoS parameters that a service has to maintain during its interaction with a specific customer. However, their approach is limited to Web services and does not consider other applications types. Frutos et al. [] discuss the main approach of the EU project BREIN [9] to develop a framework that extends the characteristics of computational Grids by driving their usage inside new target areas in the business domain for advanced SLA management. BREIN applies SLA management to Grids, whereas we target SLA management in Clouds. Dobson et al. [15] present a unified QoS ontology applicable to QoS-based Web services selection, QoS monitoring, and QoS adaptation. However, they do not consider application provisioning strategies. Comuzzi et al. [14] define the process for SLA establishment adopted within the EU project SLA@SOI framework. The authors propose the architecture for monitoring SLAs considering two requirements introduced by SLA establishment: the availability of historical data for evaluating SLA offers and the assessment of the capability to monitor the terms in an SLA offer. But, they do not consider application monitoring to guarantee the agreed SLA parameter objectives. In the next section, we present the design descriptions of our proposed monitoring architecture. III. CASVID: DESIGN DESCRIPTIONS AND USAGES CASViD (Cloud Application SLA Violations Detection) architecture is capable of handling the whole service provisioning lifecycle in a Cloud environment, which includes
3 resource allocation to services, service scheduling, application monitoring, and SLA violation detection (Figure 1). Customer Front-End Node Physical Resources 1. Service Request + Response Monitor Framework Service Interface 5. Deploy Virtualization Layer Fig Validate Request SLA Management Framework 6. Monitor 4. Service Request Application Deployer Computing Environment Nodes. Setup VMs Virtualization Layer Physical Resources CASViD Architecture. Customers place their service requests through a defined interface to the front-end node (step 1, Figure 1), which acts as the management node in the Cloud environment. The VM configurator sets up the Cloud environment by deploying preconfigured VM images (step ) on physical machines and making them accessible for service provisioning. The request is received by the service interface and delivered to the SLA management framework for validation (step 3), which is done to ensure that the request comes from the right customer. In the next step the service request is passed to the application deployer (step 4), which allocates resources for the service execution and deploys it in the Cloud environment (step 5). After deploying the service application, CASViD monitors the application execution and sends the monitored information to the SLA management framework (step 6) for processing and detection of SLA violations. The VM configurator and application deployer are components for allocating resources and deploying applications on our Cloud testbed. They are included in the architecture to show our complete solution. The Application Deployer is responsible for managing the execution of user applications, similar to brokers in the Grid literature [1], [16], [6], [30], focusing on parameter sweeping executions [11]. It simplifies the processes of transferring application input data to each VM, starting the execution, and collecting the results from the VMs to the front-end node. The mapping of application tasks to VMs is performed dynamically by a scheduler located in the Application Deployer each slave process consumes tasks whenever the VM is idle. Further details on this component and VM configurator are found in our previous work [17], [18]. The execution of the applications and the monitoring process can be done automatically by the Cloud provider, or can be incorporated into a Cloud Service that can be instantiated by the users. The proposed CASViD architecture is generic in its usage VM Configurators as it is not designed for a particular set of applications. The service interface supports the provisioning of transactional as well as computational applications. The SLA management framework can handle the provisioning of all application types based on the pre-negotiated SLAs. Description of the negotiation process and components is out of scope of this paper and is discussed by Brandic et al. [8]. A. System and Application Monitor CASViD architecture contains a flexible monitoring framework based on the SNMP (Simple Network Management Protocol) standard [1]. It receives instructions to monitor applications from the SLA management framework and delivers the monitored information. It is based on the traditional manager/agent model used in network management. Figure presents the monitor architecture. The manager, located in the management node, polls periodically each agent in the cluster to get the monitored information. In order to enhance its scalability, the monitor uses asynchronous communication with all cluster agents. It is composed of a library and an agent. The monitor agent implements the methods to capture each metric defined in the CASViD monitor MIB (Management Information Base). At the manager side, the monitor library provides methods to configure which metrics should be captured and which nodes should be included in the monitoring. The SLA management framework in the system architecture uses this library to configure the monitoring process and retrieve the desired metrics. The retrievement process can be done by collecting the metrics information from application or operating system log files. Management Node Management System SNMP Protocol Monitor MIB /proc Fig.. Metrics Monitor Library SNMP Agent Monitor Agent Application Folder Metrics Processing Node... Application Folder CASViD Monitor Overview. Similar to other monitoring systems [1], [9], CASViD monitor is general purpose and supports the acquisition of common application metrics, and even system metrics such as CPU and memory utilization. The application metrics (SLA parameters) to be monitored depends on the application type and how to ensure its performance. B. SLA Management Framework The service provisioning management and detection of application SLA objective violations are performed by the SLA management framework component. This component is central and interacts with the Service Interface, Application Deployer, and CASViD monitor. In order to manage the SLA violations,
4 it receives the monitored information from the monitor agents embedded in the computing nodes where the applications are executing. The management framework is designed to access the SLA database containing the originally agreed SLAs between the customer and the provider. It retrieves from this database the SLA objectives, which are used together with predefined thresholds to calculate future SLA violation threat or detect real violation situation. The strategy of detecting SLA violations is based on the use of predefined threat thresholds, which are more restrictive threshold than the violation thresholds. A violation threshold is a value indicating the least acceptable performance level for an application. For example Response time ms. In this case, ms is the violation threshold and the threat threshold could be about 1.5ms, which allows the system to have 0.5ms of reaction time. In this paper, the violation thresholds are derived from the SLA documents and the threat thresholds are defined manually by the Cloud provider considering its experience with the various workloads running in its environment. Exceeding the threat threshold values indicates the occurrence of future SLA violations. With this information the system can react quickly to avert the violation threat and save the Cloud provider from costly SLA violation penalties. In case the violation threat cannot be averted and the real violation threshold is exceeded, the system logs the necessary information for calculating the appropriate SLA violation penalties. C. Algorithm for Obtaining Effective Interval The proposed CASViD architecture can be used in several Cloud management scenarios. For example to facilitate the execution of multiple applications on a single computing node to reduce cost and save energy in a Cloud environment. CASViD can also assist management systems to migrate applications between computing nodes in order to shutdown some nodes to save energy. The applications could belong to different customers and provisioned based on their agreed SLA terms. The architecture measures the resource consumption and performance of each application to detect SLA violations. In order to achieve this, there is a need of finding an interval for effective measurements. The effective measurement interval depends on the application and its input and such interval has to be determined automatically. Thus, the provider can automatically select the effective measurement interval for each independent application by sampling different intervals until the provider utility gets stable. Algorithm 1 presents the pseudo-code for obtaining the effective measurement interval. As presented in Algorithm 1, the variables are first initialized (lines 1-4). Then the algorithm evaluates each interval to find the effective one (line 5). The algorithm uses each interval to monitor the application for a maximum specified time (line 6) after which it checks if the net utility gained with the current interval is higher than the highest net utility so far (line 7). If yes, this net utility gain becomes the highest net utility (line 8) and this interval is set to be the current effective interval Algorithm 1: Pseudo-code for Obtaining the Effective Measurement Intervals. 1 intervallist set list of possible intervals effectiveinterval intervallist[0] 3 maxtime MAXTIME 4 netutility 0 5 for interval intervallist do 6 tmpnetutility monitorapp(maxtime) 7 if tmpnetutility > netutility then 8 netutility tmpnetutility 9 effectiveinterval interval 10 return effectiveinterval (line 9). If no, the previous highest net utility is retained. The algorithm goes back to step 5 and checks the other interval using the same procedure. At the end, the interval with the highest net utility is returned as the effective measurement interval (line 10). The calculation of the net utility is described in Section V-B. IV. CASVID: IMPLEMENTATION DETAILS This section presents the implementation choices and decision for the CASViD architecture. The implementation aims at fulfilling some of the fundamental Cloud computing requirements such as scalability, efficiency, and reliability. A. CASViD Monitor The CASViD monitor uses the SNMP protocol for the communication between the manager and the agent in each cluster node. It is composed of a library and an agent. The monitor library is implemented in Java and uses the SNMP4J library 1, which provides access to all functionalities of the SNMP protocol for Java applications. The monitor uses version c of the SNMP protocol to communicate with the agents. The communication is performed using asynchronous requests to enhance the scalability. Each request to an agent creates a listener process which is automatically called when the message arrives. The CASViD monitor agent is implemented in Python and receives the SNMP request through the net-snmp daemon that is installed in each node. The net-snmp daemon forwards all requests for the metrics defined in the CASViD monitor MIB to the monitor agent. The monitor agent periodically processes the requests, which are instructions to probe the application metrics and returns the obtained results to be packaged in an SNMP message and sent back to the manager by the net-snmp daemon. We used SNMP in the CASViD monitor to realize a generic solution deployable in various platforms and operating systems. SNMP is well established, and even many hardware devices today are being managed based on SNMP protocol. 1 SNMP4j - Free Open Source SNMP API for Java - Net-SNMP -
5 B. CASViD SLA Framework The whole framework is implemented in Java language. To realize the SLA violation detection, it interacts with the monitor through a defined interface where it receives a data structure holding the metric-value pairs monitored by the monitor agents. With the metric-value pairs, it builds a message buffer for the Java Messaging Service (JMS) [4]. The JMS is used together with Apache ActiveMQ [] to realize a scalable communication mechanism for the framework. The message passes through ESPER engine [19], which filters out identical monitored values so that only changed values between measurements are delivered for the evaluations against the predefined thresholds. The filtering reduces the number of messages to be processed in order to increase the scalability of the framework. We use MySQL DB to store the processed messages. In this respect, we use HIBERNATE to map our Java classes into DB tables for easy storing and retrieving of information. This framework is implemented to be highly scalable. The JMS and ActiveMQ are used because they are platform independent and due to the scalability of the underlying ActiveMQ queues. Furthermore, the application of ESPER to filter out identical monitored information reduces drastically the number of messages to be processed. Especially in situations where the agents are monitoring in short intervals. V. EVALUATION The primary goal of this evaluation is to provide a proof of concept. In this regard, we evaluate two aspects: (i) the ability of the architecture to monitor applications at runtime to detect SLA violations and (ii) the capability of automatically determining the effective measurement interval for efficient monitoring. We carry out these evaluations using real world applications provisioning scenarios executed on a real Cloud testbed and discuss the applicability of the CASViD architecture in large-scale Cloud environments. We also show results on monitoring intrusion of the CASViD monitor. A. Environmental Configurations The basic hardware components of our experimental Cloud testbed is shown in Table I. The table shows the resource capacities of the physical and the virtual machines being used in the Cloud testbed. We use Xen virtualization technology in our testbed, precisely we run Xen on top of Oracle Virtual Machine (OVM) server. This experiment testbed is located at the High Performance Computing Lab at Catholic University of Rio Grande do Sul Brazil. TABLE I CLOUD ENVIRONMENT COMPOSED OF 36 VIRTUAL MACHINES. Machine Type = Physical Machine OS CPU Cores Memory Storage OVM Server AMD Opteron GHz 8 GB 50 GB Machine Type = Virtual Machine OS CPU Cores Memory Storage Linux/Ubuntu AMD Opteron GHz MB 5 GB We have in total nine physical machines and, based on the resource capacities presented in Table I, we host 4 VMs on each physical machine. The VM configurator deploys the VMs onto the physical hosts, thus creating a virtualized Cloud environment with up to 36 nodes capable of provisioning resources to applications. Figure 3 depicts the experimental testbed. The front-end node serves as the control entity. It runs the components of the proposed architecture. The testbed shows the processes of provisioning a user application. The application is uploaded through the front-end node and is executed on the computing node. After the execution, the output is transferred back to the front-end node. USERS... upload frame descriptions 1 + QoS requirements download video 4 establish SLA + allocate resources and map tasks FRONT-END NODE SLA Manager + Monitor Application Deployer VM Deployer and Configurator Fig. 3. CLOUD PROVIDER frames 3 process monitor + frames resources Experimental Testbed. COMPUTING NODE User Application (e.g. POVRAY) Application Monitor VM VM... VM XEN Hypervisor As shown in our testbed of Figure 3, we deploy the components in two levels of hierarchies: i) in front-end node and ii) in computing nodes. This separation makes the system scalable because we run the management processes on the front-end node and the actual application provisioning on the computing nodes. The monitor agents, running on the computing nodes, monitor the application metrics at execution, and send back the monitored information to the front-end node. The monitor agents are light weighted and consume little computing capacity. With this setup, one can easily manage many computing nodes. B. Utility Function Definition The effective measurement interval is an economic factor. The goals of the provider are i) to achieve the maximal profit; and ii) to maintain the agreed SLA objectives for the applications while efficiently utilizing resources. The trade-off between these two factors determines the effective measurement interval. To derive such an interval, we define a utility function (U) for the provider, which is based on experiences gained from existing utility functions discussed by Lee et al. [8]. The utility function considers on the one hand the provider profit and on the other hand the cost associated with the effort of detecting SLA violations and the penalty cost of the violations. Equation 1 presents the utility function. U = βɛ{customer} P c(β) P t(β) (µ M c + ψɛ{rt,t P } α(ψ) V p) (1) where P c is the service provisioning cost, P t is the duration of provisioning in minutes, µ is the number of measurements, M c is the measurement cost, α (ψ) is the number of detected SLA
6 violations of the SLA objectives, RT is response time, T P is throughput, and V p is the SLA violation penalty. P c * P t is equal to the provider profit. Defining the service provisioning cost is subject to negotiations between the customer and the service provider. In our experiments, we defined service provisioning costs based on experiences from existing approaches [7], [33]. This utility function is not a configuration for the experimentations rather it will be used to analyze the achieved results. The values of the parameters are different for each customer/application type. C. Experimental Workload with Real World Scenarios Our experimental workload comprises applications based on the Persistence of Vision Raytracer (POV-Ray) [3], which is a ray tracing program available for several computing platforms. For the experiments, we designed three workload applications that can be executed sequentially or simultaneously on our Cloud testbed environment. With the three workloads, we cover different application behaviours thereby realizing heterogeneous load in the experiments. The workloads are based on three POV-Ray applications with different characteristics of time for rendering frames, as shown in Figure 4 and their behaviour illustrated in Figure 5. Each workload contains approximately 000 tasks. Each task has an execution time that varies from 10 to 40 seconds. Fish: rotation of a fish on water. Time for rendering frames is variable. Box: approximation of a camera to an open box with objects inside. Time for rendering frames increases during execution. Vase: rotation of a vase with mirrors around. Time for processing different frames is constant. Execution Time (s) (a) Fish. (b) Box. (c) Vase. Fig Frame ID Fig. 5. (a) Fish. POV-Ray Application Animation Images. Execution Time (s) Frame ID (b) Box. Execution Time (s) Frame ID (c) Vase. Behaviour of Execution Time for Each POV-Ray Application. Our architecture handles simultaneous customer provisioning. Therefore, the experiments contain three scenarios, where each scenario has a given number of customers. These scenarios represents real world provisioning situations where a provider is simultaneously provisioning one or multiple customer applications using his Cloud resources. Furthermore, it shows the ability of the CASViD architecture to independently monitor the application performance of each customer. Each customer has a distinct SLA document for his/her workload application. The SLAs must be guaranteed for each application to avoid costly SLA penalties. Table II presents the SLA objectives for the applications. These SLA objectives are defined based on historical data and experiences with these specific application types. The response time is expressed in seconds and the throughput in frames per second (f/s). Here, response time means the time between the submission time for executing an application and its completion. The customer application stack to be provisioned on the Cloud environment is made up of i) the SLA document specifying the quality of service for the application and ii) the application files to be executed. TABLE II SLA OBJECTIVE THRESHOLDS SPECIFICATION. SLA Parameter Response Time Throughput Scenario 1 Customer1 65s.75 f/s Scenario SLA Parameter Customer1 Customer Response Time 430s 540s Throughput 3.99 f/s 1.35 f/s Scenario 3 SLA Parameter Customer1 Customer Customer3 Response Time 795s 430s 1030s Throughput f/s.31 f/s f/s D. Achieved Experimental Results We defined and used five measurement intervals to monitor the application workloads in this experiment. Table III shows the achieved results of the three scenarios for each measurement interval. The applications run for about 1 minutes in scenario 1, minutes in scenario, and 30 minutes in scenario 3. The different execution length of the scenarios is necessary to investigate the application behaviors in each case. Table III shows the number of SLA violations detected with each measurement interval for the two SLA parameters - Response Time and Throughput. These two SLA parameters are monitored in this evaluation because they define the desirable quality of service for the POV-Ray applications. In case of different application types, the parameters to be monitored might differ. In Table III the five seconds measurement intervals is a reference interval meaning the current interval used by the provider to monitor application executions. To explain the results in the table for example in scenario 1, the customer application provisioning length was 1 minutes. With 10 seconds interval, we made 7 measurements within this provisioning period. From these measurements, 51 response time SLA violations and 16 throughput SLA violations were detected. As shown in Table III, the number of detected SLA violations decreases as the measurement interval increases. This
7 TABLE III NUMBER OF DETECTED SLA VIOLATIONS. Scenario 1 Intervals 5s 10s 0s 30s 60s Nr. of Measurements Customer1 Nr. of Violations Response Time SLA Parameter Throughput Scenario Intervals 5s 10s 0s 30s 60s Nr. of Measurements Customer1 Nr. of Violations Response Time SLA Parameter Throughput Customer Nr. of Violations Response Time SLA Parameter Throughput Scenario 3 Intervals 5s 10s 0s 30s 60s Nr. of Measurements Customer1 Nr. of Violations Response Time SLA Parameter Throughput Customer Nr. of Violations Response Time SLA Parameter Throughput Customer3 Nr. of Violations Response Time SLA Parameter Throughput is due to the missed SLA violation detection in between the measurement interval. It illustrates the risk involved with larger measurement intervals. We analyze these results in a different section to determine the effective measurement interval. E. Monitoring Intrusion One of the issues that are typically evaluated in a monitoring system is its intrusion, i.e., what is the overhead incurred in the system when the monitoring is used. The intrusion of a monitoring system is usually related to the sampling or measurement frequency used. Higher frequencies result in a higher intrusion. In order to evaluate the intrusion of CASViD monitor, we executed the three POV-Ray workloads (Box, Fish and Vase), measured the total execution time without monitoring, and compared against the total execution time using the monitoring system with different sampling frequencies. The sampling frequencies were 1,, 3, 6 and 1 samples per minute, which corresponds to 60, 30, 0, 10 and 5 seconds of interval between samples. The chart in Figure 6 shows the intrusion with each workload. We can observe that the intrusion in all workloads presented a linear behaviour in relation to the sampling frequency. In all cases, the sampling frequency of 3 samples per minute (0-second interval) produced an intrusion smaller than 1%, resulting in a small impact in the workload performance. Due to the linearity in the monitor s intrusion, the sampling frequency can be easily tuned to reach a desired intrusion boundary. In the next section, we analyze the achieved monitored results whereby we consider the monitoring intrusiveness in defining the cost of measurement to be used in the utility Intrusion (%) Fig Box Fish Vase Monitoring frequency (samples per minute) CASViD Monitor s Intrusion with Different Sampling Frequencies. function presented in Equation 1 for the analysis. F. Results Analysis In this section, we first manually analyze the achieved results to determine the effective measurement interval using the utility function defined in Section V-B. Then, we demonstrate the method to automatically determine this interval using Algorithm 1 in Section III-C. The experimental scenarios are analyzed separately. The first scenario (Table II) deals with provisioning and monitoring of one customer application. In this case the customer pays a provisioning cost of $0.6 per minute (i.e., the service price) and the provisioning time length is 1 minutes. The SLA penalty cost is $0.04 and the measurement cost for the system is $0.0. Note that the cost values are experimental values. The idea is derived from existing approaches presented in literature [7], [33]. Figure 7 presents the analyzed results of scenario 1. The 5-second interval is the reference measurement interval to capture all SLA violations for the applications in each case. Provider Net Utility ($) Customer Measurements Intervals (sec) Fig. 7. Scenario 1 Analyzed Results. The analyzed results show the net utility (in dollar) of the provider with each measurement interval. The net utility translates into the profit of the provider in provisioning the customer application. The 10-second measurement interval has the highest net utility and is considered the effective one. The later intervals miss several SLA violations and thereby incur high penalty cost.
8 In Scenario the provider provisions and monitors two customer applications using their specified SLA objectives as shown in Table II. The first customer pays a provisioning cost of $0.5 per minute while the second customer pays $0.4 per minute. SLA penalty cost of $0.045 was agreed for customer 1 and $0.038 for customer. The measurement cost is the same for both applications and is specified to be $ Applying these values in the utility function of Equation 1 we achieve the results presented in Figure 8. Provider Net Utility ($) Customer1 Customer Measurements Intervals (sec) Fig. 8. Scenario Analyzed Results. As depicted in Figure 8, for customer 1, the 60-second measurement interval has the highest net utility and in our opinion the effective measurement interval for the provider to adequately monitor the application of this customer. The other intervals provide lesser utility for the provider. For customer, the 10-second measurements interval proves to be the effective one with the highest net utility. In this case it can be seen that the reference measurement interval provides a negative utility meaning that the provider loses revenues in his current situation. Therefore, finding another measurement interval is essential for the business continuity of the provider. Provider Net Utility ($) Customer1 Customer Customer Measurements Intervals (sec) Fig. 9. Scenario 3 Analyzed Results. Scenario 3 consists of the provisioning and monitoring of three different customer applications based on their respective SLA objectives. Customer 1 pays a provisioning cost of $0.5 per minute and customer pays $0.6 per minute while customer 3 pays $0.4 per minute. The agreed SLA penalty for customer 1 is $0.035, for customer is $0.038, and for customer 3 is $0.05. The customer applications executes simultaneously on the testbed, thus there is only one measurement cost of $0.03. Figure 9 presents the analyzed results of this scenario. As shown in Figure 9, for customer 1 and, the 10-second measurement interval provides the highest net utility and therefore is the effective interval for the provider to cost-efficiently monitor the application of these customers at runtime. In the case of customer 3, the 0-second interval provides the highest net utility and is considered the effective measurement interval for this customer applications. Generally, the effective measurement interval determined by the total net utility is a trade-off between the monitoring cost and the number of detected SLA violation at runtime (see Equation 1). The monitoring cost represents the efforts and overheads in monitoring the applications while the number of detected SLA violations determines the amount of penalty cost the provider has to pay to the customer. Thus, these two parameters express the efficiency and cost of monitoring an application execution. Provider Net Utility ($) Fig. 10. Interval Customer Execution Line (min) Behaviour of Provider Net Utility for the 10-sec Measurement Based on our experiments, the proposed architecture proved to be efficient in monitoring and detecting application SLA violation situations. As described in Section III-C, the effective measurement interval depends on the application and its input and has to be determined automatically. Figure 10 presents the behavior of the provider net utility for the 10-second measurement interval over the execution of the entire application of scenario 1. This demonstrates the method to automatically find the effective measurement interval. From the figure, it can be observed that after 5 minutes, the metric gets steady. As the net utility reaches this stability, it is possible to have a good prediction on this metric for this interval. Therefore, by doing so for other intervals, it is possible to automatically find the one that provides best cost-benefit value for measuring and detecting SLAs. The basic idea is that a user would specify a range of possible intervals (based on personal experience with the application/environment) and the monitoring architect would detect the suitable measurement interval via Algorithm 1. G. Applying CASViD in Large-Scale Environments The experiments so far were performed in a real testbed for a small scenario. To apply the CASViD architecture in a large-scale Cloud environment, there are two challenges to be addressed: (i) large number of users and (ii) many application types. The issue of large number of users is not trivial for monitoring and detecting SLA violations in large-scale Clouds. This problem has been addressed with the design of our monitoring framework. The separation of the
9 monitoring activities from the analysis of the monitored results as described in Section V-A makes our architecture scalable and capable of usage in large-scale environments. The efficiency of automatically determining the effective measurement interval for many application types depends on the number of concurrent request at each period of time. This issue has been addressed with Algorithm 1 presented in Section III-C. VI. CONCLUSIONS AND FUTURE WORK This paper proposed an application monitoring architecture (CASViD), which monitors and detects SLA violations at the application layer. Application monitoring requires tools for the whole application management lifecycle. Thus, we developed tools for resource allocation, scheduling, and deployment. We evaluated our architecture on a real Cloud testbed using three types of image rendering application workloads with heterogeneous behaviors necessary to investigate different application provisioning scenarios and to determine the effective measurement intervals to monitor the provisioning processes. From our experiments, the proposed architecture is efficient in monitoring and detecting single application SLA violation situations. More applications, including multi-tier applications, will be considered as future work. Furthermore, we observed that one can automatically find the effective measurement interval by sampling different ones and checking their net utility values. With the realization of CASViD, we achieved the capabilities of monitoring and detecting SLA violations of single customer applications being provisioned in a shared host. This contributes to a more efficient management of Clouds, especially in application provisioning, and reduces cost for the customers in situations where the customer applications do not require exclusive resources. Based on our investigations on monitoring strategies and SLA violation detection, we will integrate knowledge management techniques to propose reactive actions to prevent or correct the SLA violation situations. Monitoring capabilities facilitate best reactive actions, which contribute to our vision of self manageable autonomic Cloud infrastructures. ACKNOWLEDGMENT This work is supported by the Vienna Science and Technology Fund (WWTF) under the grant agreement ICT Foundations of Self-governing ICT Infrastructures (FoSII). The experiments were performed in the High Performance Computing Lab at Catholic University of Rio Grande do Sul (LAD-PUCRS) Brazil. REFERENCES [1] D. Abramson, R. Buyya, and J. Giddy. A computational economy for grid computing and its implementation in the Nimrod-G resource broker. Future Generation Computer Systems, 18(8): , 00. [] ActiveMQ. Messaging and integration pattern provider. [3] Z. Balaton and G. Gombs. Resource and job monitoring in the grid. In Proceedings of Euro-Par [4] Z. Balaton, P. Kacsuk, and N. Podhorszki. Application monitoring in the grid with grm and prove. In Proc. of ICCS [5] B. Balis, M. Bubak, W. Funika, T. Szepieniec, and R. Wismller. An infrastructure for grid application monitoring. In Recent Advances in Parallel Virtual Machine and Message Passing Interface. 00. [6] B. Balis, M. Bubak, W. Funika, T. Szepieniec, R. Wismller, and M. Radecki. Monitoring grid applications with grid-enabled omis monitor. In Grid Computing [7] M. Boniface, S. C. Phillips, A. Sanchez-Macian, and M. Surridge. Dynamic service provisioning using GRIA SLAs. In Proc. of ICSOC 07, 007. [8] I. Brandic. Towards self-manageable cloud services. In Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 09), 009. [9] Brein. Business objective driven reliable and intelligent grids for real business. [10] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 5(6): , 009. [11] H. Casanova, G. Obertelli, F. Berman, and R. Wolski. The AppLeS parameter sweep template: User-level middleware for the Grid. In Proc. of the Supercomputing (SC 00), 000. [1] J. D. Case, M. Fedor, M. L. Schoffstall, and J. Davin. Simple network management protocol (snmp), [13] S. Clayman, A. Galis, C. Chapman, M. L.R, L. M. Vaquero, K. Nagin, B. Rochwerger, and G. Toffetti. Monitoring future internet service clouds. In Towards the Future Internet - A European Research Perspective book, April 010. [14] M. Comuzzi, C. Kotsokalis, G. Spanoudkis, and R. Yahyapour. Establishing and monitoring SLAs in complex service based systems. In Proceedings of the 7th International Conference on Web Services (ICWS 09), 009. [15] G. Dobson and A. Sanchez-Macian. Towards unified QoS/SLA ontologies. In Proc. of SCW 06, 006. [16] E. Elmroth and J. Tordsson. A grid resource broker supporting advance reservations and benchmark-based resource selection. In Proc. of the Workshop on State-of-the-art in Scientific Computing (PARA 04), 004. [17] V. C. Emeakaroha, R. N. Calheiros, M. A. S. Netto, I. Brandic, and C. A. F. De Rose. DeSVi: An architecture for detecting SLA violations in cloud computing infrastructures. In Proc. of the nd International ICST Conference on Cloud Computing (CloudComp 10), 010. [18] V. C. Emeakaroha, M. A. Netto, R. N. Calheiros, I. Brandic, R. Buyya, and C. A. D. Rose. Towards autonomic detection of sla violations in cloud infrastructures. Future Generation Computer Systems, 011. [19] ESPER. Event stream processing. [0] A. J. Ferrer. Optimis: a holistic approach to cloud service provisioning. [1] T. C. Ferreto, C. A. F. D. Rose, and L. D. Rose. Rvision: An open and high configurable tool for cluster monitoring. In CCGRID 0, 00. [] H. M. Frutos and I. Kotsiopoulos. BREIN: Business objective driven reliable and intelligent grids for real business. International Journal of Interoperability in Business Information Systems, 3(1):39 4, 009. [3] A. S. Glassner et al. An introduction to ray tracing. Academic Press London, [4] JMS. Java messaging service. [5] B. Koller and L. Schubert. Towards autonomous SLA management using a proxy-like approach. Multiagent Grid Systems, 3(3):313 35, 007. [6] K. Krauter, R. Buyya, and M. Maheswaran. A taxonomy and survey of grid resource management systems for distributed computing. Software: Practice and Experience, 3(): , 00. [7] C. B. Lee and A. Snavely. On the user-scheduler dialogue: Studies of user-provided runtime estimates and utility functions. International Journal of High Performance Computer Applications, 0(4): , 006. [8] K. Lee, N. W. Paton, R. Sakellariou, and A. A. F. Alvaro. Utility driven adaptive worklow execution. In Proc. of the 9th International Symposium on Cluster Computing and the Grid (CCGrid 09), 009. [9] M. L. Massie, B. N. Chun, and D. E. Culler. The Ganglia distributed monitoring system: Design, implementation and experience. Parallel Computing, 30(7): , 004. [30] M. A. S. Netto and R. Buyya. Offer-based scheduling of deadlineconstrained bag-of-tasks applications for utility computing systems. In Proc. of the 18th International Heterogeneity in Computing Workshop (HCW 09), in conj. with the 3rd IEEE International Parallel and Distributed Processing Symposium (IPDPS 09), 009.
10 [31] M. Rak, S. Venticinque, T. a. M andhr, G. Echevarria, and G. Esnal. Cloud application monitoring: The mosaic approach. In Cloud Computing Technology and Science (CloudCom), 011 IEEE Third International Conference on, pages , dec [3] J. Shao and Q. Wang. A performance guarantee approach for cloud applications based on monitoring. In Computer Software and Applications Conference Workshops (COMPSACW), 011 IEEE 35th Annual, pages 5 30, july 011. [33] C. S. Yeo and R. Buyya. Pricing for utility-driven resource management and allocation in clusters. International Journal of High Performance Computer Applications, 1(4): , 007.
Towards Autonomic Detection of SLA Violations in Cloud Infrastructures
Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Vincent C. Emeakaroha a, Marco A. S. Netto b, Rodrigo N. Calheiros c, Ivona Brandic a, Rajkumar Buyya c, César A. F. De Rose b a Vienna
DeSVi: An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures
DeSVi: An Architecture for Detecting SLA Violations in Cloud Computing Infrastructures Vincent C. Emeakaroha 1, Rodrigo N. Calheiros 3, Marco A. S. Netto 2, Ivona Brandic 1, and César A. F. De Rose 2 1
How To Manage Cloud Service Provisioning And Maintenance
Managing Cloud Service Provisioning and SLA Enforcement via Holistic Monitoring Techniques Vincent C. Emeakaroha Matrikelnr: 0027525 [email protected] Supervisor: Univ.-Prof. Dr. Schahram Dustdar
Dynamic Monitoring Interval to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said
Dynamic Monitoring to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said Abstract Service level agreement (SLA) is a contract between service
Towards Energy-efficient Cloud Computing
Towards Energy-efficient Cloud Computing Michael Maurer Distributed Systems Group TU Vienna, Austria [email protected] http://www.infosys.tuwien.ac.at/staff/maurer/ Distributed Systems Group
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure W lodzimierz Funika, Bartosz Jakubowski, and Jakub Jaroszewski Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059,
Simulation-based Evaluation of an Intercloud Service Broker
Simulation-based Evaluation of an Intercloud Service Broker Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, SCC Karlsruhe Institute of Technology, KIT Karlsruhe, Germany {foued.jrad,
Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures
Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Michael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, and Ivona Brandic Distributed Systems Group Institute of Information
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS
Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University
Keywords: Cloudsim, MIPS, Gridlet, Virtual machine, Data center, Simulation, SaaS, PaaS, IaaS, VM. Introduction
Vol. 3 Issue 1, January-2014, pp: (1-5), Impact Factor: 1.252, Available online at: www.erpublications.com Performance evaluation of cloud application with constant data center configuration and variable
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004
Manjrasoft Market Oriented Cloud Computing Platform
Manjrasoft Market Oriented Cloud Computing Platform Innovative Solutions for 3D Rendering Aneka is a market oriented Cloud development and management platform with rapid application development and workload
Environments, Services and Network Management for Green Clouds
Environments, Services and Network Management for Green Clouds Carlos Becker Westphall Networks and Management Laboratory Federal University of Santa Catarina MARCH 3RD, REUNION ISLAND IARIA GLOBENET 2012
Application Deployment Models with Load Balancing Mechanisms using Service Level Agreement Scheduling in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose,
DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT
International Journal of Advanced Technology in Engineering and Science www.ijates.com DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT Sarwan Singh 1, Manish Arora
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014
Attila Kertész, PhD. LPDS, MTA SZTAKI. Summer School on Grid and Cloud Workflows and Gateways 1-6 July 2013, Budapest, Hungary
CloudFederation Approaches Attila Kertész, PhD. LPDS, MTA SZTAKI Summer School on Grid and Cloud Workflows and Gateways 1-6 July 2013, Budapest, Hungary Overview Architectural models of Clouds European
Manjrasoft Market Oriented Cloud Computing Platform
Manjrasoft Market Oriented Cloud Computing Platform Aneka Aneka is a market oriented Cloud development and management platform with rapid application development and workload distribution capabilities.
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications
CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications Bhathiya Wickremasinghe 1, Rodrigo N. Calheiros 2, and Rajkumar Buyya 1 1 The Cloud Computing
Key Research Challenges in Cloud Computing
3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH
Cloud Computing for Control Systems CERN Openlab Summer Student Program 9/9/2011 ARSALAAN AHMED SHAIKH CONTENTS Introduction... 4 System Components... 4 OpenNebula Cloud Management Toolkit... 4 VMware
CLOUD MONITORING BASED ON SNMP
CLOUD MONITORING BASED ON SNMP 1 J. SWARNA, 2 C. SENTHIL RAJA, 3 DR.K.S.RAVICHANDRAN 1,3 SASTRA University, Thanjavur, Tamil Nadu, India 2 Alcatel-Lucent India Limited, Chennai, India Email: 1 [email protected]
A Hierarchical Self-X SLA for Cloud Computing
A Hierarchical Self-X SLA for Cloud Computing 1 Ahmad Mosallanejad, 2 Rodziah Atan, 3 Rusli Abdullah, 4 Masrah Azmi Murad *1,2,3,4 Faculty of Computer Science and Information Technology, UPM, Malaysia,
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Monitoring Elastic Cloud Services
Monitoring Elastic Cloud Services [email protected] Advanced School on Service Oriented Computing (SummerSoc 2014) 30 June 5 July, Hersonissos, Crete, Greece Presentation Outline Elasticity in Cloud
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman 1, Kawser Wazed Nafi 2, Prof. Syed Akhter Hossain 1 and Prof. M. M. A. Hashem 1 Department
DATA PORTABILITY AMONG PROVIDERS OF PLATFORM AS A SERVICE. Darko ANDROCEC
RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2013 Special Number DATA PORTABILITY AMONG PROVIDERS OF PLATFORM AS A SERVICE Darko ANDROCEC
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud
A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES Carlos Oliveira, Vinicius Petrucci, Orlando Loques Universidade Federal Fluminense Niterói, Brazil ABSTRACT In
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure
J Inf Process Syst, Vol.9, No.3, September 2013 pissn 1976-913X eissn 2092-805X http://dx.doi.org/10.3745/jips.2013.9.3.379 Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment
SLA Driven Load Balancing For Web Applications in Cloud Computing Environment More Amar [email protected] Kulkarni Anurag [email protected] Kolhe Rakesh [email protected] Kothari Rupesh
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
Optimization of QoS for Cloud-Based Services through Elasticity and Network Awareness
Master Thesis: Optimization of QoS for Cloud-Based Services through Elasticity and Network Awareness Alexander Fedulov 1 Agenda BonFIRE Project overview Motivation General System Architecture Monitoring
Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University
Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service
1. Simulation of load balancing in a cloud computing environment using OMNET
Cloud Computing Cloud computing is a rapidly growing technology that allows users to share computer resources according to their need. It is expected that cloud computing will generate close to 13.8 million
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
Deploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
Virtual Machine Instance Scheduling in IaaS Clouds
Virtual Machine Instance Scheduling in IaaS Clouds Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi Departamento de Ciência da Computação UNESP - Univ Estadual Paulista Bauru,
Performance Management for Cloud-based Applications STC 2012
Performance Management for Cloud-based Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Key Performance Challenges in Cloud Challenges & Recommendations 2 Context Cloud Computing
Performance Management for Cloudbased STC 2012
Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS
Stream Processing on GPUs Using Distributed Multimedia Middleware
Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research
Two-Level Cooperation in Autonomic Cloud Resource Management
Two-Level Cooperation in Autonomic Cloud Resource Management Giang Son Tran, Laurent Broto, and Daniel Hagimont ENSEEIHT University of Toulouse, Toulouse, France Email: {giang.tran, laurent.broto, daniel.hagimont}@enseeiht.fr
Federation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
A Service for Data-Intensive Computations on Virtual Clusters
A Service for Data-Intensive Computations on Virtual Clusters Executing Preservation Strategies at Scale Rainer Schmidt, Christian Sadilek, and Ross King [email protected] Planets Project Permanent
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Cloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities
Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities Rajkumar Buyya 1, Rajiv Ranjan 2 and Rodrigo N. Calheiros 1,3 1 Grid Computing and
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
FCM: an Architecture for Integrating IaaS Cloud Systems
FCM: an Architecture for Integrating IaaS Systems Attila Csaba Marosi, Gabor Kecskemeti, Attila Kertesz, Peter Kacsuk MTA SZTAKI Computer and Automation Research Institute of the Hungarian Academy of Sciences
FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA (fulvio.valenza@polito.
+ FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA ([email protected]) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems
A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems Anton Beloglazov, Rajkumar Buyya, Young Choon Lee, and Albert Zomaya Present by Leping Wang 1/25/2012 Outline Background
A Framework for Performance Analysis and Tuning in Hadoop Based Clusters
A Framework for Performance Analysis and Tuning in Hadoop Based Clusters Garvit Bansal Anshul Gupta Utkarsh Pyne LNMIIT, Jaipur, India Email: [garvit.bansal anshul.gupta utkarsh.pyne] @lnmiit.ac.in Manish
STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)
10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information
Energy Constrained Resource Scheduling for Cloud Environment
Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering
Profit Based Data Center Service Broker Policy for Cloud Resource Provisioning
I J E E E C International Journal of Electrical, Electronics ISSN No. (Online): 2277-2626 and Computer Engineering 5(1): 54-60(2016) Profit Based Data Center Service Broker Policy for Cloud Resource Provisioning
Shoal: IaaS Cloud Cache Publisher
University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3
This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
Group Based Load Balancing Algorithm in Cloud Computing Virtualization
Group Based Load Balancing Algorithm in Cloud Computing Virtualization Rishi Bhardwaj, 2 Sangeeta Mittal, Student, 2 Assistant Professor, Department of Computer Science, Jaypee Institute of Information
Holistic Performance Analysis of J2EE Applications
Holistic Performance Analysis of J2EE Applications By Madhu Tanikella In order to identify and resolve performance problems of enterprise Java Applications and reduce the time-to-market, performance analysis
AUTONOMOUS INTELLIGENT AGENT INDEMNIFICATION IN SLA (IAIS) ARCHITECTURE FOR EFFORTLESS MONITORING OF SLA VIOLATIONS
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 2015, VOLUME: 05, ISSUE: 03 AUTONOMOUS INTELLIGENT AGENT INDEMNIFICATION IN SLA (IAIS) ARCHITECTURE FOR EFFORTLESS MONITORING OF SLA VIOLATIONS
FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools Márcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville,
Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads
Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads G. Suganthi (Member, IEEE), K. N. Vimal Shankar, Department of Computer Science and Engineering, V.S.B. Engineering College,
EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS
EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR CERN-ATS-2011-200 A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS F. Ehm, A. Dworak, CERN, Geneva, Switzerland Abstract
Aneka: A Software Platform for.net-based Cloud Computing
Aneka: A Software Platform for.net-based Cloud Computing Christian VECCHIOLA a, Xingchen CHU a,b, and Rajkumar BUYYA a,b,1 a Grid Computing and Distributed Systems (GRIDS) Laboratory Department of Computer
Monitoring Services in a Federated Cloud - The RESERVOIR Experience
Monitoring Services in a Federated Cloud - The RESERVOIR Experience Stuart Clayman, Giovanni Toffetti, Alex Galis, Clovis Chapman Dept of Electronic Engineering, Dept of Computer Science, University College
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Dynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
Cloud Computing and Open Source: Watching Hype meet Reality
Cloud Computing and Open Source: Watching Hype meet Reality Rich Wolski UCSB Computer Science Eucalyptus Systems Inc. May 26, 2011 Exciting Weather Forecasts 99 M 167 M 6.5 M What is a cloud? SLAs Web
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability
MuleSoft Blueprint: Load Balancing Mule for Scalability and Availability Introduction Integration applications almost always have requirements dictating high availability and scalability. In this Blueprint
