CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS

Size: px
Start display at page:

Download "CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS"

Transcription

1 SCS M&S Magazine. Vol 3. Issue 3. A. Sekiguchi, K. Shimada, Y. Wada, A. Ooba, R. Yoshimi, and A. Matsumoto. CONFIGURATION MANAGEMENT TECHNOLOGY FOR LARGE-SCALE SIMULATIONS Atsuji Sekiguchi, Kuniaki Shimada, Yuji Wada Cloud Computing Research Center FUJITSU LABORATORIES LTD. Kawasaki, Kanagawa Japan Akio Ooba, Ryouji Yoshimi, Akiko Matsumoto Service Management Middleware Division FUJITSU LIMITED Kawasaki, Kanagawa Japan ABSTRACT Large-scale simulation-based experiments are a key value-creation technique as well as a big hurdle for M&S experts because of its long simulation execution time. To overcome this hurdle, the experts might utilize cloud computing services in their simulation runs, yet they confront challenges of properly setting the services that they are not familiar with. In large-scale ICT (Information and Communication Technology) systems, such as cloud computing, a reduction of operation management workloads and stabilization of the systems are requested. Configuration management can reduce the workloads and improper settings of design by describing the rules for the design and verifying the configurations. However, it is too hard for non-experts to describe the rules correctly. We thus developed configuration management technology that does not require rules written by operation managers. The configurations have relationships between hardware and software that corresponds to the tree structure of the ICT system. Our technology uses the relationships as consolidation rules that should be satisfied by the configurations. We implemented a prototype of our technology and applied it to real systems. As a result, 94 percent (117,632/125,286) of the configurations converged under an environment of servers with uniform configurations, and 94 percent of the workloads were also reduced. With our reduced setting requirements, we expect that cloud computing services embrace broader range of users, such as M&S experts to run large-scale simulations. 1 INTRODUCTION Recently, ICT systems have become larger and more complicated with the spread of cloud computing data centers (DCs), server virtualization technology, and other factors. As a result, operations management of systems has become more complicated and workloads for operations management have increased. However, operations management workloads must be reduced because customers of the systems request a reduction in the costs of operations management. On the other hand, stabilization of systems is requested as a social obligation because ICT systems are widely used in the social infrastructures. Thus, achieving reductions in operations management workloads and stabilization is a problem in the operations management of ICT systems. ICT systems might cause large-scale problems and stop the supply of services because of a few improper settings (AWS Team 2011, Brown 2004). The configuration is a set of pairs of parameters and values that determine the behavior of devices and software, such as the servers, networks, and storage components of the ICT system. As examples of parameters, there are many kinds of information to identify the devices on the network (e.g., IP address: Internet Protocol address), to cooperate with other devices (e.g., DNS: Domain Name System). The values can be a number or a string (e.g., in the case of the host name, "server1"). The improper setting is to set the wrong value to a parameter. Moreover, in large-scale ICT systems, operations management workloads for the configurations also increase. In general, the number of configurations increases in proportion to the number of devices and the software of the ICT systems. Thus, the workloads of design and the verification become larger. ISBN

2 Configuration management is needed for the following two reasons: 1) a reduction is required in the workloads of operations management for such configurations, and 2) stabilization is required from a reduction in the improper settings. In this paper, we define configuration management as the process of design, verification, and deployment of configurations for running the devices and software of the ICT systems correctly. Configuration management is necessary for the initial construction and changes (addition, modification, or removal of anything that could have an effect on ICT Services in ITIL (Lacy and Macfarlane 2007) in the systems. Usually, the system changes many times during its lifecycle. For the initial construction and change in the systems, improper settings can occur in the design, verification, and deployment. Configuration management is not only a task of ICT professionals like as operation managers. Users, who use cloud computing resources for large-scale calculation such as simulation, might manage a large number of configurations of many servers. For instance, HLA (High Level Architecture, IEEE 1516) is a distributed architecture for distributed simulations. HLA can control simulators which run on many servers, but does not support proper configurations of servers. Users who will set up HLA on cloud computing resources need to cope with configuration management for their many servers. To reduce the workloads of design and verification and to reduce the number of improper settings, several researches report that the configurations should satisfy rules that automate the design and verification (Eilam et al. 2006; Hagen and Kemper 2010). In these research studies, the rules are supposed to be described by the operation managers. However, it is difficult (especially, non-experts) to describe and maintain these rules. Because mistakes in describing the rules, that is bugs, are easily generated, improper settings cannot be easily reduced. To reduce the number of improper settings in cloud computing resource, several researches report that the behavior of the ICT system can be verified by the simulation of cloud computing resources (Joshi, Gunawi, and Sen 2011; Calheiros et al. 2011). These approaches may detect improper settings. However, these approaches require additional workloads, because these approaches require a large number of test cases to detect improper settings. We developed configuration management technology that does not require rules written by operation managers. We focused on the following feature: when thinking like that ICT system has a tree structure such as servers, racks, and DCs, the nodes correspond to devices and software applications. Two parameters of the nodes in a subtree or two subtrees may have the same value (e.g., the value of the network address parameters on all servers in rack A). Based on this feature, we classified the rules of the relationships of parameters and values. Using these rules, operation managers associate the rules with the configurations. Our technology manages the parameters by consolidating two or more parameters with the same name and value based on the associated rules. As a result, the number of configurations managed by operation managers can be reduced. The workloads of design and verification can also be reduced. Moreover, because improper settings can be discovered by checking whether the rules are satisfied by the parameters and the values, system stability can be improved. The rest of this paper is composed as follows. First, we treat related work in section 2. Next, we introduce our developed technology in section 3. In section 4, we explain an experiment that uses this technology in two largescale environments. Finally, we end with the conclusion and future work. 2 RELATED WORK We explain two stages and three components in configuration management and the improper settings that occurred in these stages. Then, we describe other research studies. Configuration management is requested for the following two stages of ICT systems: 1) initial construction, which is executed only once at the start of the life cycle of the ICT system, and 2) change, which is executed at the addition, modification, or removal of anything on the system in the life cycle of the ICT system. Configuration management consists of the following three components: A) design, which identifies the requirements of system change and defines the solution that meets the requirements; B) verification, which confirms the correctness of the configurations, and C) deployment, which applies the configurations to the devices. The improper settings that cause problems may occur in each component. For instance, in component A, the configurations may not be designed properly (mistakes in design). In component B, the improper settings of the configurations may not be detected (mistakes of the verification). In component C, the configuration may be deployed to the devices incorrectly (mistakes in deployment). ITIL (Information Technology Infrastructure Library) is the name given to best practices for operations management (Lacy and Macfarlane 2007). Component A corresponds to change management in ITIL. Components B and C correspond to release and deployment management in ITIL. However, ITIL does not describe a specific method to reduce the workloads and the number of improper settings for design and verification. ISBN

3 With regard to components A and B to reduce the workloads for design and verification, some approaches are formal methods and policy-based management (VDM 2012; alloy 2012; Eilam et al. 2006; Hagen and Kemper 2010). In these approaches, operation managers describe the rules with declarative languages in advance. These rules consist of conditions that create the configurations and constraints to check the configurations. Based on the rules, a large number of configurations can be created and verified automatically. Thus, operation managers can reduce the workloads and the number of improper settings for design and verification. However, it is difficult for operation managers (especially, non-experts) to describe and maintain these rules. Therefore, mistakes in the description of the rules (bugs) are easily generated. Bugs in the rules for component A generate improper settings, and bugs in the rules for component B prevent the detection of improper settings because the configuration cannot be properly verified. About component C to reduce the workloads for design and verification, there are many approaches, such as deployment automation (CFEngine 2012; Puppet 2012; Opscode 2012; BMC 2012). These approaches deploy the configurations to devices automatically. Because there is no human operation, this approach can prevent mistakes in deployment caused by human error. However, it cannot solve the problem about components A and B. Some approaches define models to measure configuration complexity and the workloads (Brown, Keller, and Hellerstein 2005; Diao et al. 2007). These approaches do not describe a specific method to reduce the workloads and the improper settings. 3 DEVELOPED TECHNOLOGY First, we describe the features of the configurations. Next, we analyze the ICT systems and the configurations. Then, we explain the approach of our technology. At the end of this section, we analytically evaluate our approach. 3.1 Features of the configurations A large-scale ICT system has a large number of devices and software applications, such as servers, networks, storage, and middleware. The devices and software applications have configurations. The configurations consist of a set of pairs of parameters and values, which determine the behavior of the devices or software applications as described in section 1. There are various parameters such as the host name, IP address, and timeout setting. A parameter must be defined with a value (e.g., Timeout=120; 120 is the value). Hereafter, for simplicity, we will focus on servers as the target devices in this paper. On a server, the pair of a parameter and a value is listed in the configuration file. One configuration file contains one or more parameters and corresponding values (Figure 1-(A)). The same parameters might be listed in different configuration files. To distinguish these parameters, we define an item as the pair of "a file path in a configuration file where the parameter is listed" and "the parameter" (Figure 1-(B)). This uses the fact that two file paths of two different configuration files are always different. Configuration Configuration File File Path ex. /etc/httpd/conf/httpd.conf Parameter ex. Timeout Value ex. 120 Configuration Item File Path Parameter Value (A) A structure of a server configuration (B) An item based structure of a server configuration Figure 1: A server configuration structure. Because a device or a software application has many items, the number of items for the entire system is substantial. The number is expressible as follows. Let N denote the number of servers. Let M i denote the number of configuration files for any server s i (i=1 to N). Moreover, let p ij denote the number of parameters in a configuration file f ij on s i (j=1 to M i ). At this time, let n p denote the total number of items on all servers, ISBN

4 n p N M i 1 j 1 i p ij. Therefore, n p is enormous when N and M i are numerous in a large-scale ICT system such as cloud computing. Hitherto, handling of the items for the number of n p are required to design, verify, and deploy in every stage of the change as shown as Figure 2. The workloads for design and verification become greater in proportion to the number of items. On the other hand, a few improper settings may cause large-scale problems and stop the supply of services. Configuration Files Administrator Servers n p item design (~ n p ) verify deploy repeat Figure 2: A flow of a configuration management. 3.2 An analysis of the ICT system and the configurations The ICT system has a tree structure that consists of a hierarchy such as servers, racks, and DCs (Figure 3). In Figure 3, the node of the tree stands for a server, rack, and DC. The edge of the tree stands for a relationship of inclusion; if an upper node and a lower node are connected by an edge, the upper node contains the lower nodes. For instance, a server is consolidated in a rack, and, a rack is consolidated in a DC. Because a leaf node corresponds to a server, the items exist in every leaf nodes. In the tree structure of the ICT system, two servers A and B in an arbitrary subtree may have items that have the same file path and the parameter. When the values of these items are the same, we define "the items are the same in the subtree". Some items in a subtree must be the same because of the system design such as the networking. For instance, the gateway addresses of servers in a rack are the same, and, the net-mask values in servers in a DC are the same. (Root) DC Rack Server Figure 3: A tree structure of a large-scale ICT system. Two servers A (in an arbitrary subtree t 1 ) and B (in another subtree t 2 ) may have items that have the same file path and the parameter. When the values of these items are the same, we define "the items are the same in the subtrees t 1 and t 2 ". Some items in subtrees must be the same because of the system design such as the location of DCs. For instance, time-zone values in servers in a DC and another DC are the same. In contrast, some items should have a different value in a subtree. Two servers A and B in an arbitrary subtree may have items that have the same file path and the parameter. When the values of these items are different from each other, we define "the items are different in the subtree". Some items in a subtree must be different because of the system design such as the networking. For instance, IP addresses of servers in a rack are different. Two servers A (in an arbitrary subtree t 1 ) and B (in another subtree t 2 ) may have items that have the same file path and the parameter. When the values of these items are different from each other, we define "the items are dif- ISBN

5 ferent between subtrees t 1 and t 2 ". For instance, domain name of servers in a DC are different from the value of another DC. Generalizing the above, we can classify the items of the system using the following two axes, 1) Commonality and 2) Comparison Targets. 1) Commonality: the same/different value a) Same: the values must be the same. For example, the gateway setting of the servers b) Different: the values must be different from the others. For example, IP addresses of the servers 2) Comparison Targets: in a subtree / in two subtrees a) In a subtree: comparison targets are certain servers in a subtree. For example, two servers in a rack A b) In two subtrees: comparison targets are certain servers in two subtrees. One of the targets is in a subtree, and the other is in another subtree. For example, a server in a rack and another server in another rack Consequently, the items can be classified into four types (1a-2a, 1b-2a, 1a-2b and 1b-2b) by two types of Commonality and two types of Comparison Targets (Table 1). 3.3 Approach Comparison Target Table 1: A classification of configurations. Commonality Same Different In a subtree 1a-2a 1b-2a In two subtrees 1a-2b 1b-2b Based on the above analysis, we developed a configuration management technology that supports the work of A) design and B) verification in the stages of initial construction and changes. The point of our technology is to consolidate items that have the same file path, parameter, and value in a subtree and to manage consolidated items. As a result, the workloads can be reduced by decreasing items to be managed, and the improper settings can be reduced by checking rules such as "values are the same/different". We show the flow of the configuration management using our technology in Figure 4. The Configuration management consists of the following five components: 1) preparation, 2) creation of a tree structure of the configurations, 3) design, 4) verification, and 5) creation and deployment of the configurations. 1) - 5) correspond to 1) - 5) in Figure 4. Configuration Files Tree Administrator Structure Servers n p n c item preparation (~ n p) creation of a tree design ( ~ n c) verify deploy repeat 1) 2) 3) 4) 5) Figure 4: A flow of a configuration management by this technology. ISBN

6 1) Preparation This is the work of the initial construction stage. The input is the items and Table 1. We regard the four classifications of Table 1 as rules of verification. In this paper, the rules mean constraints that should be satisfied by the values of the items. Based on the analysis of section 3.2, we treat an item as the same for all of the servers. The operation managers select the rules from Table 1 for the items. About the item, they select the root node of a subtree that is the target of the rule. For example, if item i should have the same value in a subtree that has the root node n r, the rule of i is 1a-2a (the same value in a subtree) and the target node is n r. The output is the result of the classification of the rule of each item. 2) Creation of a tree structure of the configurations This is the work of the stage of initial construction. The input is a set of pairs of the item and value and the output of 1). Our technology associates the set of pairs of the item and value with the nodes of the tree structure of the ICT system by using the rules. We explain how to associate it by the following four cases. Case 1: In all of servers in the subtree t 1, if items have the same file paths, parameters, and values, the items are classified under the rule 1a-2a. We create a new item i 1 that have the same file path, parameter, and value of these items. The item i 1 stands for these items. We associate the item i 1 and the rule 1a-2a with the target node. The target node is the root node n 1 of t 1. The information is shown as No. 1 in Table 2. In this case, the items of the number of the servers are consolidated to one item i 1. Case 2: In all of servers in two subtrees t 2 and t 3, if items have the same file paths, parameters, and values, the items are classified under the rule 1a-2b. We create a new item i 2 that have the same file path, parameter, and value of these items. The item i 2 stands for these items. We associate the item i 2 and the rule 1a-2b with the target nodes. The target nodes are the root nodes n 2 and n 3 of t 2 and t 3, respectively. The information is shown as No. 2 in Table 2. In this case, the items of the number of the servers are consolidated to one item i 2. Table 2: An example of information of associated item, rule, and nodes. No. Item Rule Node(s) 1 i 1 1a-2a n 1 2 i 2 1a-2b n 2, n 3 3 i 3 1b-2a n 4 4 i 4 1b-2b n 5 Case 3: In all of servers in the subtree t 3, if there are some items that have the same file paths and parameters, and the values of the items are different from each other, these items are classified under the rule 1b-2a. We associate these items and the rule 1b-2a with each leaf nodes. For instance, in a case of the item i 3 in these items, we associate the item i 3 and the rule 1b-2a with the target node. The target node is the leaf node (server) n 4 that have i 3. The information is shown as No. 3 in Table 2. Case 4: In all of servers in two subtrees t 2 and t 3, if there are some items that have the same file paths and parameters, and the values of the items are different from each other, these items are classified under the rule 1b-2b. We associate these items and the rule 1b-2b with each leaf nodes. For instance, in a case of the item i 4 in these items, we associate the item i 4 and the rule 1b-2b with the target node. The target node is the leaf node (server) n 5 that has i 4. The information is shown as No. 4 in Table 2. The output is the tree structure associated with the sets of pairs of the items and the rules. 3) Design This is the work of the initial construction stage and the change stage. The input is the output of 2) or 4). The operation managers design and change the values of each item. In the case of the consolidated item, because it stands for many items, the operation managers can change the values on many servers by changing one value of the item. ISBN

7 The output is similar to 2), but the values may be changed. 4) Verification This is the work of the stages of initial construction and changes. The input is the output of 3). This technology verifies the configurations by checking whether the value, which may be changed by the operation managers in 3), satisfies the rule for the item. It checks that the rules described in section 3.2 are satisfied with the values of the items. If it is not satisfied, the operation managers are notified the error. They can remove the error with a repeat of 3) and 4). For instance, in a case of the item classified under the rule 1b-2a, the node associated with the item is the root node of a subtree, and the value of the items of the subtree should be different from each other. If items that have the same value exist, we regard the rule as having been violated. The output is a verification result of each item. 5) Creation and deployment of the configuration This is the work of the initial construction stage and the change stage. The input is the output of 3). This technology makes the configurations from the tree structure associated with the set of the items and the rules, and deploys them to the servers. As we explained in 2), the items that are classified under the rule 1a-2a or 1a-2b are associated with the internal nodes of the tree structure. The other items that are classified under the rule 1b-2a or 1b-2b are associated with the leaf nodes. Therefore, the items of a server can be made by collecting items associated with nodes through the tree structure from the leaf node (server) to the root node. Thus, in a case of the item that belongs to the rule of "Same" (cf. 1a-2a and 1a-2b in Table 1), the operation managers can consistently deploy the set of items to many servers simply by changing one consolidated item. The output is the configuration files for each server. 3.4 Evaluation We qualitatively evaluate the design and verification workloads that can be reduced using this technology. We assume that the workloads are proportional to the number of managed items, and we compare between the number of the items of this technology and the number of the items of the existing method. The total number of the parameters of the existing method is n p as described in section 3.1. Here, we define the total number of independent items n t. The independent items mean the items that have different file path and parameter from each other. Hence, n t < n p. In the work of the preparation (cf. section 3.3-1), the operation managers have to specify the rules for the items of the number of n t in the case of using our technology. Because this work did not exist under the existing method, the operation managers' workloads will be increased compared with the existing method. On the other hand, in the stage of the change, the design and verification for n p was required in the existing method. In this technology, only the number n c (n t < n c < n p ) of the consolidated items has to be designed and verified (cf. the right side of Figure 4). When the number of the consolidated items increases, n c approaches n t (the effect of the reduction of items rises). In the best case, n c = n t. For instance, if parameters of a hundred servers (n p = 100) are consolidated to only one item, n c = n t = 1. That is, the number of items becomes 1/100. Moreover, the design and verification are repeated in each stage of the change. Therefore, even if the workloads of the preparation are considered, the total workloads that include the workloads of the preparation, design, and verification can be reduced when there are many consolidated items. 4 EXPERIMENT We experimented to confirm the reduction of the workloads and the detection of the improper settings by our technology. We explain the experiment and the result in the following order: 4.1 Experiment method, 4.2 Experimental environments, 4.3 Evaluation method, 4.4 Result and 4.5 Consideration. ISBN

8 4.1 Experiment method Sekiguchi, Shimada, Wada, Ooba, Yoshimi, and Matsumoto We implemented an experimental tool that executes 1) 5) described in section 3.3. We evaluated this tool in two environments described in 4.2. In this experiment, we picked up all of the items that were changed from default value in the environments at first. In addition, we calculated the total number of items n p and the total number of independent items n t. The independent items mean the items that have different file path and parameter from each other. As rules for each item, the operation managers selected ten practical rules as follows. The items have the same or different values in a subtree that has the following node as the root node: 1. the root node of the tree structure of the ICT system, 2. an internal node of the layer of DCs, and 3. an internal node of the layer of racks. Three target nodes times two types of rules is six rules. The items have the same or different values in two subtrees that have the following nodes as the root nodes: 1. two internal nodes of the layer of DCs, and 2. two internal nodes of the layer of racks. Two target nodes times two types of rules is four rules. 4.2 Experimental environments The data of two environments (A and B) are shown in Table 3. The environment A is an in-house system that offers servers of uniform configurations for software development and tests. About a hundred servers belong to one group. The configurations of the servers in the group are almost the same (e.g., language, gateway, and time zone). However, a little number of configurations is different (e.g., IP address, and host name). Therefore, the configurations can be consolidated in 1/100 ideally. The total number of the servers is 1,020. n p is 132,940 and n t is 603. Table 3: Information of the experimental environments. Environment Type Number The total number of servers 1,020 A B The total number of parameters [n p ] 132,940 The total number of items [n t ] 603 The total number of servers 292 The total number of parameters [n p ] 18,096 The total number of items [n t ] 3,016 In contrast, environment B is an in-house system that consists of the typical three layers of a web, an application, and a database. It has six networks. In each network, the servers have individual configurations. However, the configurations for each network are similar. Thus, the configurations can be consolidated as 1/6 ideally. The total number of the servers is 292. n p is 18,096 and n t is 3, Evaluation method We evaluated the effect of the reduction of the workloads and improper settings. First, we define an index X [%] to evaluate the effect of the reduction of the workloads. Here, X is the reduction rate of the number of parameters. We define X as X = (1 n c / n p ) * 100, where n c is the number of consolidated items and n p is the total number of parameters. Thus, the larger X, the more effective the reduction of the workloads. As described in section 3, the items that have the same file paths, parameters, and values are consolidated in one item by creating a tree structure of the configurations. For instance, items of a hundred servers are consolidated in one if the items have the same file path, parameters, and values. In this case, X = (1 1/ 100)* 100 = 99[%]. ISBN

9 Next, we confirmed the effect of the reduction of the improper settings by detecting the improper settings using the verification of the rules and the values of the items. If this technology can detect improper settings, this technology is useful for the verification of the configurations. As described in section 3, we verify the configurations as follows. We compared the value of each item with its rule that had selected by the operation managers. If the item violated the rule, we assumed an error. The error shows the level of the gap between the classification of the rule by the operation managers and the real settings. 4.4 Result We show the experiment result in Table 4. The total number of consolidated items (n c ) is 7,654 and 11,658 in the environment A and B, respectively. The number of reduced items (n r, where n r = n p n c ) is 125,286 and 6,438. The reduction rate X is 94% and 36%. The number of the error items (n e ) is 47 and 174 in environments A and B, respectively. 4.5 Consideration Table 4: Results. Environment Item Number Converged Items[n c ] 7,654 A B Reduced Items[n r ] 125,286 Reduced Rate [X] 94% Error Items [n e ] 47 Converged Items[n c ] 11,658 Reduced Items[n r ] 6,438 Reduced Rate [X] 36% Error Items [n e ] 174 The effect of the reduction of the workloads: Two results of X reflect the uniformity of the environments. X is high in the high uniform environment such as A. Therefore, the reduction rate of the workloads of the operations management becomes high in high uniform environments. Because the uniformity of an environment of cloud computing seems to be high, a large contribution for the reduction rate of the workloads can be expected in the environment of cloud computing. The effect of the reduction of the improper settings: We examined the errors carefully. The errors consist of the improper settings and improper selections of the rules by the operation managers. We confirmed the improper settings in both environments A and B. These improper settings were not known by the operation managers. The both of improper settings and improper selections of the rules can be reduced by reviewing the configurations and the rules with the detection of such errors. Thus, a contribution for the reduction of the improper settings can be expected in ICT systems. 5 CONCLUSION AND FUTURE WORK We focused on the characteristics of the configurations that have relationships (such as the same or different) between two devices or software applications that correspond to two nodes in a tree structure of the ICT systems (such as servers, racks, and DCs). By using the relationships as consolidation and verification rules that should be satisfied by the configurations, we developed a configuration management technology that does not require rules written by operation managers. This technology reduces the workloads for design by consolidating the same configurations and decreasing the number of managed configura- ISBN

10 tions. Moreover, the improper settings are discovered by verifying the configurations based on the relationships. We evaluated this technology in two environments with different levels of uniformity. We confirmed the reduction rate of configurations and the ability to detect the improper settings. As a result, we showed that the reduction rate of the configurations is very high (94%) in uniform environments such as cloud computing. Moreover, we showed that the improper settings could be found by our technology. We plan to cope with the following three future tasks. 1) Automation of selection of the rule for the item: In this paper, the operation managers selected the rules for each item based on the operational experience (heuristics). However, because the number of items is substantial, this work requires large workloads during preparation. Moreover, the operation managers may make a mistake in the selection of the rule of the item. Then, it is preferable to investigate item's values based on the rules and to select the suitable rule automatically. 2) Extraction of rules: In this paper, we prepared the rules beforehand. However, this approach cannot handle unknown rules. It is preferable to extract the rules by analyzing various data. By analyzing relationships between many items or correlations with the others data such as trouble information and traffic patterns, rules of avoidance of problems and performance optimization may be obtained. 3) Additional supports for users of large-scale computing: Our approach in this paper helps operation managers who need to manage large-scale computing resources such as cloud computing. They are not only ICT professionals but also application users who need to set up their configurations for their purpose (such as simulation). To help such users, it is necessary to support some operations, such as installation of software and middleware, observation of resources to detect troubles, restoration of resources from troubles, and deployment of data for applications (e.g. simulation) to resources. These supports will enable users such as M&S experts to build and run large-scale calculations on cloud computing resources easily. REFERENCES Alloy alloy: a language & tool for relational models. Accessed June BMC BladeLogic Automation Suite. Accessed June Brown, A. B "Oops! coping with human error in it systems". Queue 2: Brown, A. B., A. Keller, and J. L. Hellerstein "A model of configuration complexity and its application to a change management system". In Proceedings of the 9th IFIP/IEEE International Symposium: CFEngine CFEngine. Accessed June Calheiros, R., R. Ranjan, A. Beloglazov, C. De Rose, and R. Buyya "CloudSim: a Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms". Software: Practice and Experience 41: Diao, Y., A. Keller, S. Parekh, and V. V. Marinov "Predicting Labor Cost through IT Management Complexity Metrics". In Proceedings of the 10th IFIP/IEEE International Symposium: Eilam, T., M. H. Kalantar, A. V. Konstantinou, G. Pacifici, and J. Pershing "Managing the Configuration Complexity of Distributed Applications in Internet Data Centers". IEEE Communications Magazine 44: Hagen, S., and Kemper, A "Model-Based Planning for State-Related Changes to Infrastructure and Software as a Service Instances in Large Data Centers". In Proceedings of the 2010 IEEE 3rd International Conference: Joshi, P., H. S. Gunawi, and K. Sen "PreFail: a Programmable Tool for Multiple-Failure Injection". In Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications: Lacy, S., and I. Macfarlane ITIL Version 3 Service Transition. Norwich:Stationery Office. Opscode Chef. Accessed June PuppetLabs Puppet. Accessed June The AWS Team Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. Accessed June ISBN

11 VDM VDM (The Vienna Development Method). Accessed June AUTHOR BIOGRAPHIES ATSUJI SEKIGUCHI is a researcher at Dept. of Cloud Computing Research Center, Fujitsu Laboratories Limited. His research focuses on the operations management of cloud computing. His address is sekia@jp.fujitsu.com. KUNIAKI SHIMADA is a researcher at Dept. of Cloud Computing Research Center, Fujitsu Laboratories Limited. His research focuses on the operations management of cloud computing. His address is shimada.k@jp.fujitsu.com. YUJI WADA is a chief researcher at Dept. of Cloud Computing Research Center, Fujitsu Laboratories Limited. His research focuses on the operations management of cloud computing. His address is wada.yuuji@jp.fujitsu.com. AKIO OOBA is a developer at Dept. of Service Management Middleware Division, Fujitsu Limited. His research and development focus on the operations management middleware. His address is ooba.akio@jp.fujitsu.com. RYOUJI YOSHIMI is a developer at Dept. of Service Management Middleware Division, Fujitsu Limited. His research and development focus on the operations management middleware. His address is yoshimi.ryouji@jp.fujitsu.com. AKIKO MATSUMOTO is a developer at Dept. of Service Management Middleware Division, Fujitsu Limited. Her research and development focus on the operations management middleware. Her address is matumoto.akiko@jp.fujitsu.com. ISBN

Online Failure Prediction in Cloud Datacenters

Online Failure Prediction in Cloud Datacenters Online Failure Prediction in Cloud Datacenters Yukihiro Watanabe Yasuhide Matsumoto Once failures occur in a cloud datacenter accommodating a large number of virtual resources, they tend to spread rapidly

More information

On-Demand Virtual System Service

On-Demand Virtual System Service On-Demand System Service Yasutaka Taniuchi Cloud computing, which enables information and communications technology (ICT) capacity to be used over the network, is entering a genuine expansion phase for

More information

Provisioning Technology for Automation

Provisioning Technology for Automation Provisioning Technology for Automation V Mamoru Yokoyama V Hiroshi Yazawa (Manuscript received January 17, 2007) Vendors have recently been offering more products and solutions for IT system automation

More information

Operations Visualization for Private Clouds

Operations Visualization for Private Clouds Operations Visualization for Private Clouds Tomoki Shiratori Hideki Hara For the operation of private clouds to be made more efficient, the ICT resources (servers, storage devices, networks, etc.), which

More information

Increasing QoS in SaaS for low Internet speed connections in cloud

Increasing QoS in SaaS for low Internet speed connections in cloud Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 195 200 doi: 10.14794/ICAI.9.2014.1.195 Increasing QoS in SaaS for low Internet

More information

Provisioning of Standardized Business Systems

Provisioning of Standardized Business Systems Provisioning of Standardized Business Systems Ken Murata Hideo Shimizu Norihiko Sakamoto In the face of severe business conditions, companies have a growing need for flexible business processes and innovative,

More information

LivePoplet: Technology That Enables Mashup of Existing Applications

LivePoplet: Technology That Enables Mashup of Existing Applications LivePoplet: Technology That Enables Mashup of Existing Applications Akihiko Matsuo Kenji Oki Akio Shimono (Manuscript received January 29, 2009) We have developed LivePoplet, a technology that allows the

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.

More information

Dynamic resource management for energy saving in the cloud computing environment

Dynamic resource management for energy saving in the cloud computing environment Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan

More information

System Management and Operation for Cloud Computing Systems

System Management and Operation for Cloud Computing Systems System Management and Operation for Cloud Computing Systems Motomitsu Adachi Toshihiro Kodaka Motoyuki Kawaba Yasuhide Matsumoto With the progress of virtualization technology, cloud systems have been

More information

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams

Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 6, June 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Middleware support for the Internet of Things

Middleware support for the Internet of Things Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Network Sensing Network Monitoring and Diagnosis Technologies

Network Sensing Network Monitoring and Diagnosis Technologies Network Sensing Network Monitoring and Diagnosis Technologies Masanobu Morinaga Yuji Nomura Takeshi Otani Motoyuki Kawaba (Manuscript received April 7, 2009) Problems that occur in the information and

More information

Fujitsu s DFX Application

Fujitsu s DFX Application Fujitsu s DFX Application V Yukio Sekiya V Hideaki Takahashi (Manuscript received May 26, 2006) Improvements in product design are conventionally made after the start of massproduction, followed by reductions

More information

Realization of Next-generation ICT Infrastructure with UnifIDone Campus Cloud

Realization of Next-generation ICT Infrastructure with UnifIDone Campus Cloud Realization of Next-generation ICT Infrastructure with UnifIDone Campus Cloud Keita Hatase Takahiro Totani These days, the information and communications technology (ICT) environments in universities such

More information

SummitStack in the Data Center

SummitStack in the Data Center SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution Extreme Networks offers a highly virtualized, centrally manageable

More information

Three Stages for SOA and Service Governance

Three Stages for SOA and Service Governance Three Stages for SOA and Governance Masaki Takahashi Tomonori Ishikawa (Manuscript received March 19, 2009) A service oriented architecture (SOA), which realizes flexible and efficient construction of

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

Services Transactions on Cloud Computing (ISSN 2326-7550) Vol. 3, No. 2, April-June 2015

Services Transactions on Cloud Computing (ISSN 2326-7550) Vol. 3, No. 2, April-June 2015 WEBCLOUDSIM: AN OPEN ONLINE CLOUD COMPUTING SIMULATION TOOL FOR ALGORITHM COMPARISON Youqi Chen, Qibo Sun, Ao Zhou, Shangguang Wang State Key Laboratory of Networking and Switching Technology Beijing University

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

CLOUD COMPUTING - OPPORTUNITIES

CLOUD COMPUTING - OPPORTUNITIES CLOUD COMPUTING - OPPORTUNITIES White Paper Batoi Systems Pvt Ltd www.batoi.com BATOI SYSTEMS PVT LTD, 2016. Published by BATOI SYSTEMS (P) LIMITED of 421, Saheed Nagar, Bhubaneswar 751 007 (INDIA), registered

More information

Autonomous Function in Interstage Application Server

Autonomous Function in Interstage Application Server Autonomous Function in Application Server V Hideki Nozaki (Manuscript received November 30, 2003) Because of the changing business environment, the ability to flexibly make configuration changes and expansions

More information

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS?

SERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS? In: New Developments in Distributed Applications and Interoperable Systems: 3rd IFIP International Working Conference (DAIS 2001), Cracow, Poland Kluwer Academic Publishers, September 2001 SERVICE ORIENTED

More information

Digital Advisory Services Professional Service Description Network Assessment

Digital Advisory Services Professional Service Description Network Assessment Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Performance Gathering and Implementing Portability on Cloud Storage Data

Performance Gathering and Implementing Portability on Cloud Storage Data International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1815-1823 International Research Publications House http://www. irphouse.com Performance Gathering

More information

Intent NBI for Software Defined Networking

Intent NBI for Software Defined Networking Intent NBI for Software Defined Networking 1 SDN NBI Challenges According to the architecture definition in Open Networking Foundation (ONF), a Software Defined Network (SDN) includes three vertically

More information

LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT

LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT LOAD BALANCING OF USER PROCESSES AMONG VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT 1 Neha Singla Sant Longowal Institute of Engineering and Technology, Longowal, Punjab, India Email: 1 neha.singla7@gmail.com

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Dr. J. W. Bakal Principal S. S. JONDHALE College of Engg., Dombivli, India

Dr. J. W. Bakal Principal S. S. JONDHALE College of Engg., Dombivli, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Factor based Resource

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

How Route Analytics Enables Virtualization and Cloud Computing

How Route Analytics Enables Virtualization and Cloud Computing How Route Analytics Enables Virtualization and Cloud Computing By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division Introduction

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

CDBMS Physical Layer issue: Load Balancing

CDBMS Physical Layer issue: Load Balancing CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna Shweta.mongia@gdgoenka.ac.in Shipra Kataria CSE, School of Engineering G D Goenka University,

More information

CONDIS. IT Service Management and CMDB

CONDIS. IT Service Management and CMDB CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...

More information

D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013

D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013 D6 INFORMATION SYSTEMS DEVELOPMENT. SOLUTIONS & MARKING SCHEME. June 2013 The purpose of these questions is to establish that the students understand the basic ideas that underpin the course. The answers

More information

Log Mining Based on Hadoop s Map and Reduce Technique

Log Mining Based on Hadoop s Map and Reduce Technique Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, anujapandit25@gmail.com Amruta Deshpande Department of Computer Science, amrutadeshpande1991@gmail.com

More information

NATIONAL CERTIFICATE (VOCATIONAL)

NATIONAL CERTIFICATE (VOCATIONAL) NATIONAL CERTIFICATE (VOCATIONAL) SUBJECT GUIDELINES DATA COMMUNICATION AND NETWORKING NQF Level 4 September 2007 DATA COMMUNICATION AND NETWORKING LEVEL 4 CONTENTS INTRODUCTION 1 DURATION AND TUITION

More information

DIFFERENT PRAGMATIC APPROACHES OF TESTING THE CLOUD APPLICATION USING SIMULATORS/EMULATORS

DIFFERENT PRAGMATIC APPROACHES OF TESTING THE CLOUD APPLICATION USING SIMULATORS/EMULATORS DIFFERENT PRAGMATIC APPROACHES OF TESTING THE CLOUD APPLICATION USING SIMULATORS/EMULATORS Ms. Vaishali Jawale Assistant Professor ASM s Institute of Computer Studies Pimpri - Pune, Abstract: Computer

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Mechanical Design Platform on Engineering Cloud

Mechanical Design Platform on Engineering Cloud Mechanical Design Platform on Engineering Cloud Yuichi Arita Naoyuki Nozaki Koji Demizu The Fujitsu Group is always using leading-edge information and communications technology (ICT) and building an integrated

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically

More information

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds

C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds Flora Karniavoura, Antonis Papaioannou, and Kostas Magoutis Institute of Computer Science (ICS) Foundation for Research

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

SDN and Data Center Networks

SDN and Data Center Networks SDN and Data Center Networks 10/9/2013 1 The Rise of SDN The Current Internet and Ethernet Network Technology is based on Autonomous Principle to form a Robust and Fault Tolerant Global Network (Distributed)

More information

Efficient Cloud Management for Parallel Data Processing In Private Cloud

Efficient Cloud Management for Parallel Data Processing In Private Cloud 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

A Case Study in Integrated Quality Assurance for Performance Management Systems

A Case Study in Integrated Quality Assurance for Performance Management Systems A Case Study in Integrated Quality Assurance for Performance Management Systems Liam Peyton, Bo Zhan, Bernard Stepien School of Information Technology and Engineering, University of Ottawa, 800 King Edward

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

The Value of Open vswitch, Fabric Connect and Fabric Attach in Enterprise Data Centers

The Value of Open vswitch, Fabric Connect and Fabric Attach in Enterprise Data Centers The Value of Open vswitch, Fabric Connect and Fabric Attach in Enterprise Data Centers Table of Contents Enter Avaya Fabric Connect. 2 A typical data center architecture with Avaya SDN Fx... 3 A new way:

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Do Your IT Housekeeping with UC4 Workload Automation Suite

Do Your IT Housekeeping with UC4 Workload Automation Suite Do Your IT Housekeeping with UC4 Workload Automation Suite Introduction This document describes how to keep the increasing complexity of data centers in check by means of IT housekeeping specifically,

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

Maintaining Quality of Service Based on ITIL-Based IT Service Management

Maintaining Quality of Service Based on ITIL-Based IT Service Management Maintaining Quality of Service Based on ITIL-Based IT Service Management V Koji Ishibashi (Manuscript received January 18, 2007) Interest in the IT Infrastructure Library (ITIL) of system management best

More information

A New Cloud Computing Architecture by Integrating Recent Best Reference Frameworks

A New Cloud Computing Architecture by Integrating Recent Best Reference Frameworks A New Cloud Computing Architecture by Integrating Recent Best Reference Frameworks Niloofar Khanghahi 1 and Ramin Nasiri 2 1 Department of Computer Engineering, Islamic Azad University, Central Tehran

More information

Alfresco Enterprise on Azure: Reference Architecture. September 2014

Alfresco Enterprise on Azure: Reference Architecture. September 2014 Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Auto-administration of glite-based

Auto-administration of glite-based 2nd Workshop on Software Services: Cloud Computing and Applications based on Software Services Timisoara, June 6-9, 2011 Auto-administration of glite-based grid sites Alexandru Stanciu, Bogdan Enciu, Gabriel

More information

IT Operations Management: A Service Delivery Primer

IT Operations Management: A Service Delivery Primer IT Operations Management: A Service Delivery Primer Agile Service Delivery Creates Business Value Today, IT has to innovate at an ever- increasing pace to meet accelerating business demands. Rapid service

More information

CLOUDFORMS Open Hybrid Cloud

CLOUDFORMS Open Hybrid Cloud Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open

More information

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing

Efficient and Enhanced Load Balancing Algorithms in Cloud Computing , pp.9-14 http://dx.doi.org/10.14257/ijgdc.2015.8.2.02 Efficient and Enhanced Load Balancing Algorithms in Cloud Computing Prabhjot Kaur and Dr. Pankaj Deep Kaur M. Tech, CSE P.H.D prabhjotbhullar22@gmail.com,

More information

BOUNDARYLESS DATACENTERS (BLDC)

BOUNDARYLESS DATACENTERS (BLDC) WWW.WIPRO.COM BOUNDARYLESS DATACENTERS (BLDC) SMART DIGITAL TRANSFORMATION ENABLER SMART DIGITAL TRANSFORMATION ENABLED DO BUSINESS BETTER DIGITIZE AND MOVE AHEAD Digitalization is disrupting and challenging

More information

Middleware for Creating Private Clouds

Middleware for Creating Private Clouds Middleware for Creating Private Clouds Hiroshi Nagakura Akihiko Sakurai Cloud computing has been attracting a lot of attention recently. This is because it can meet demands for speedy system implementation

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area

Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Seminar in Software and Service Engineering: Software Ecosystems and Infrastructures Lecture 1: Background to the topic area Kari Smolander kari.smolander@aalto.fi Course details Topic area Objectives

More information

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing

Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing International Journal of Information Science and Intelligent System, Vol. 2, No.4, 2013 Embedded Systems Programming in a Private Cloud- A prototype for Embedded Cloud Computing Achin Mishra 1 1 Department

More information

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments March 13, 2015 Abstract To provide redundancy and disaster recovery, most organizations deploy multiple data

More information

Embracing Microsoft Vista for Enhanced Network Security

Embracing Microsoft Vista for Enhanced Network Security Embracing Microsoft Vista for Enhanced Network Security Effective Implementation of Server & Domain Isolation Requires Complete Network Visibility throughout the OS Migration Process For questions on this

More information

A COMPARATIVE EVALUATION OF CLOUD MIGRATION OPTIMIZATION APPROACHES: A SYSTEMATIC LITERATURE REVIEW

A COMPARATIVE EVALUATION OF CLOUD MIGRATION OPTIMIZATION APPROACHES: A SYSTEMATIC LITERATURE REVIEW A COMPARATIVE EVALUATION OF CLOUD MIGRATION OPTIMIZATION APPROACHES: A SYSTEMATIC LITERATURE REVIEW ABDELZAHIR ABDELMABOUD, 2 DAYANG N. A. JAWAWI, 3 IMRAN GHANI, and 4 ABUBAKAR ELSAFI,2,3 Department of

More information

Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster System for Large Organization

Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster System for Large Organization Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster System for Large Organization Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng Institute of Computing Technology

More information

A Mock RFI for a SD-WAN

A Mock RFI for a SD-WAN A Mock RFI for a SD-WAN Ashton, Metzler & Associates Background and Intended Use After a long period with little if any fundamental innovation, the WAN is now the focus of considerable innovation. The

More information

Challenges in Deploying Public Clouds

Challenges in Deploying Public Clouds WHITE PAPER Ensuring Enterprise-grade Network Services for AWS Infoblox DDI for AWS increases cloud agility, supports consistent network policies across hybrid deployments, and improves visibility of public

More information

Multiagent Reputation Management to Achieve Robust Software Using Redundancy

Multiagent Reputation Management to Achieve Robust Software Using Redundancy Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu

More information

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple

More information

Automated deployment of virtualization-based research models of distributed computer systems

Automated deployment of virtualization-based research models of distributed computer systems Automated deployment of virtualization-based research models of distributed computer systems Andrey Zenzinov Mechanics and mathematics department, Moscow State University Institute of mechanics, Moscow

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic

Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic The challenge When building distributed, large-scale applications, quality assurance (QA) gets increasingly

More information

Ixonos Cloud Solutions - A Review

Ixonos Cloud Solutions - A Review Capacity Services Ixonos Plc 2015 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1 Service description... 3 1.1 Environment... 3 1.2 Security services... 4 1.3 Data Center facilities... 5 2 Service levels...

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

SPARC Enterprise s Approach to Virtualization and Its Contribution to ICT Society

SPARC Enterprise s Approach to Virtualization and Its Contribution to ICT Society SPARC Enterprise s Approach to Virtualization and Its Contribution to ICT Society Masaru Nukada Akio Satori In recent years, it has become common practice to implement virtualization technology across

More information

IT Asset Management in Today's Complex Data Center

IT Asset Management in Today's Complex Data Center IT Asset Management in Today's Complex Data Center buzzetti@us.ibm.com The IBM Worldwide Design Centers comprise certified IT architects and specialists using state-of-the-art methodologies and technologies

More information

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems

Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Zeeshan Ahmed Vienna University of Technology Getreidemarkt 9/307, 1060 Vienna Austria Email: zeeshan.ahmed@tuwien.ac.at

More information

Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform

Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform Grid Middleware for Realizing Autonomous Resource Sharing: Grid Service Platform V Soichi Shigeta V Haruyasu Ueda V Nobutaka Imamura (Manuscript received April 19, 2007) These days, many enterprises are

More information

May 13-14, 2015. Copyright 2015 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on

May 13-14, 2015. Copyright 2015 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on May 13-14, 2015 Virtual Network Overlays Working Group Follow up from last ONUG use case and fire side discussions ONUG users wanted to see formalized feedback ONUG users wanted to see progression in use

More information

Managing Traditional Workloads Together with Cloud Computing Workloads

Managing Traditional Workloads Together with Cloud Computing Workloads Managing Traditional Workloads Together with Cloud Computing Workloads Table of Contents Introduction... 3 Cloud Management Challenges... 3 Re-thinking of Cloud Management Solution... 4 Teraproc Cloud

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science

More information

A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation

A Proposed Service Broker Policy for Data Center Selection in Cloud Environment with Implementation A Service Broker Policy for Data Center Selection in Cloud Environment with Implementation Dhaval Limbani*, Bhavesh Oza** *(Department of Information Technology, S. S. Engineering College, Bhavnagar) **

More information

Design of Simulator for Cloud Computing Infrastructure and Service

Design of Simulator for Cloud Computing Infrastructure and Service , pp. 27-36 http://dx.doi.org/10.14257/ijsh.2014.8.6.03 Design of Simulator for Cloud Computing Infrastructure and Service Changhyeon Kim, Junsang Kim and Won Joo Lee * Dept. of Computer Science and Engineering,

More information

White Paper Take Control of Datacenter Infrastructure

White Paper Take Control of Datacenter Infrastructure Take Control of Datacenter Infrastructure Uniting the Governance of a Single System of Record with Powerful Automation Tools Take Control of Datacenter Infrastructure A new breed of infrastructure automation

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information