Modeling and Enforcement of Cloud Computing Service Level Agreements

Size: px
Start display at page:

Download "Modeling and Enforcement of Cloud Computing Service Level Agreements"

Transcription

1 Modeling and Enforcement of Cloud Computing Service Level Agreements Abdel-Rahman Al-Ghuwairi Jonathan Cook New Mexico State University Las Cruces, NM ABSTRACT A Service Level Agreement (SLA) defines the contract between a cloud provider and a cloud customer, detailing the resources being provided, the price the user will pay, and the quality of service (QoS) guarantees that the cloud provider ensures for the customer. If the QoS guarantees are not upheld, typically the cloud provider is assessed some penalties, such as payment credit for the customer. Monitoring and enforcing the SLA is an area of open research, and in this paper we present the foundations towards a full realization of an SLA monitoring infrastructure. We begin by presenting a formal model that can precisely describe both the SLA QoS guarantees and the penalties assessed for violation, and also describe how this model will be used for automatic SLA enforcement.. INTRODUCTION Service Level Agreements (SLAs) embody the contract between the cloud computing provider and the customer. The provider must be concerned with providing a valuable service to the customer but also within cost constraints that make their business viable in a competitive market. The customer simply wants the best computing resource availability and capacity at the cheapest price. The SLA forms the agreement between the customer and the provider as to what will be provided at the price the customer pays. This includes the quality of service (QoS) guarantees that the provide will ensure for the customer. If the QoS guarantees are not met, some sort of settlement must ensue. For example, with an IaaS compute resource (i.e., a virtual machine), the SLA might say that the VM will be available 99.9% of the time, and if during a billing cycle the availability is below this, then the customer receives some discounts on the resource price. In essence, the provider promises some level of availability at the agreed upon price, but then since realworld events can interrupt the virtualized resources it is providing, the provider agrees to a penalty assessment if the availability drops below what was promised. The main question when it comes to SLAs is: who monitors and enforces them? There are at least three possible answers the provider, the customer, or some trusted third party. Each has its own benefits and concerns. If the provider monitors itself, then what reason does the customer have to trust what it reports? It is in the provider s interest not to report SLA violations. In addition, if for example there was no attempted customer interaction with a cloud resource during a period where it was unavailable, should such a period truly be considered as unavailable time? As far as the customer is concerned, each use of the resource (before and after the period of unavailability) was successful, so there was 00% availability. If the customer must monitor the SLA, then the customer must become (or hire) an expert in setting up a monitoring infrastructure in addition to their cloud applications, and be able to properly detect when something has violated the SLA. This may be a large burden on the customer, and may preclude their desire to use the cloud provider. Some third party SLA monitors are being deployed, and this seems to be a good approach [6, 4]; however, most of them are typically contracted by the cloud provider, and thus they engender some of the same trust issues that provider self-monitoring encompasses. To further complicate matters, cloud SLAs are typically natural language documents rather than some formal specification of the agreement. Although this does not mean that they are necessarily ambiguous, it can be a barrier to moving towards any type of automated SLA enforcement. In reality, the current practice is that cloud providers typically do not want to encourage extremely tight monitoring of cloud resources, and generally require customers to report an issue with a cloud resource that the SLA might cover. For example, for availability calculations most IaaS providers require a customer to report a resource as unavailable, and the unavailable clock does not start counting until the customer report is filed [2]. Because of this, we are beginning on a research path

2 towards efficient customer-oriented IaaS cloud SLA monitoring. Our goal is to create an easy-to-use monitoring package for customers to deploy that will monitor the cloud resource they are purchasing and automatically detect whether any SLA parameters become in violation of the agreement, and then what penalties might be enforced. In this paper we present the formal foundations of our approach, since an automated system is first going to need a formal description of the SLA it is monitoring. A key part and an important novel aspect in our approach is including the penalty assessments in the formal specification. The rest of the paper is organized as follows: Section 2 presents background in cloud monitoring and in cloud SLA agreements. In Section 3 we present our formal SLA model and monitoring ideas, and Section 4 elucidates the model with a full example. Section 5 describes related work, and finally Section 6 concludes with directions for the future of this work. 2. IAAS CLOUD SERVICE LEVEL AGREE- MENTS In this section we discuss the basic purposes and content of Infrastructure-as-a-Service (IaaS) service-level agreements (SLAs). 2. Service Level Agreement Overview Cloud computing entails an environment that creates a relationship between the cloud provider and the cloud user. This relationship between the two parties is usually embodied in an agreement or contract called a Service Level Agreement (SLA). This SLA contains the Quality of Service (QoS) parameters or guarantees that the cloud resources will provide, and both parties should agree upon these guarantees prior to the beginning of the service. There are many parameters that the SLA may cover, such as performance metrics, including infrastructure and applications, availability (uptime and downtime), response time, scalability, and many other features or constraints. Even if the cloud provider and cloud users are part of the same organization (i.e., a private cloud), an SLA can still be used to assess the effectiveness of the cloud provider department and to give the cloud user departments a basis for business planning. Public cloud users desire a suitable cloud provider who can satisfy their requirements and needs at an attractive cost. On the other hand, cloud providers desire SLAs containing QoS guarantees that can be satisfied cost-effectively while meeting the users requirements to keep their business and trust. The cloud provider and a significant cloud user may have a negotiation process about each part of the SLA, and then after they reach an agreement, the cloud provider will commit to provide and maintain the QoS guarantees that are the main component of the SLA. Should the SLA be violated, agreed-upon penalties will be incurred by the provider. Users may also agree that they should be aware of and report any violation that occurred from the provider side, and claim the refund for such violation in a timely manner. The QoS guarantees in an SLA must be normally achievable to maintain the trust of cloud users. It may be tempting for a cloud provider to assert very strong QoS guarantees, such as % availability, and just accept the penalties when the service fails to meet the guarantee. However, these highly optimistic guarantees will cause lack of credibility and trust between the user and the provider [7]. 2.2 Service Level Agreement Examples Here we present examples of the QoS guarantees found in current SLAs. Rackspace [2] is a cloud provider which offers cloud servers (VMs), cloud sites, and cloud files. It also offers an SLA for each cloud type, and because we are interested in the infrastructure s SLAs, we will address their cloud server SLA as an example in this paper. The SLA of cloud servers in Rackspace covers four main services or parameters: network, data center infrastructure, cloud server hosts, and migration. In the network, Rackspace offers 00% availability for their datacenter network excluding the scheduled maintenance. The penalty will be a credit of 5% refund to the user for each 30 minutes downtime up to 00% of the monthly fee. In data center infrastructure, Rackspace ensures that the data-center power functioning 00% of the time in any given monthly billing cycle. They will credit the customer s account with 5% of the monthly fee for each 30 minutes of downtime up to 00% of the monthly fee in case of any violation occurs in this service. The third service is the server hosts in which they ensure that all server hosts are functioning and restore any failure within one hour of the problem notification. If Rackspace fails to meet this QoS guarantee, then they will credit the customer with 5 % of the fees for each additional hour of downtime up to 00% of the monthly fee. The last service is the migration where Rackspace informs the customer if any cloud server migration is needed at least 24 hours prior to the beginning of that migration. They will credit the customer with 5% of the fees for each additional hour of downtime up to 00% of the monthly fee. We can summarize this example on Table below. Another example of an SLA is the one offered by Amazon EC2 [3]. In this SLA, Amazon ensures 99.95% service availability yearly. Amazon EC2 considers the service and the uptime yearly, and the service year is the proceeding 365 days before an SLA claim. If the 2

3 Table : Rackspace SLA example QoS Credit Credit Time Attribute Guar. Value Unit (min) Network Avail 00% 5% 30 Data-center Power 00% 5% 30 Host Repair 5% 60 Time hr Migration 24hr in 5% 60 Notification advance IaaS Virtual Machine Cloud Application SLA Monitor customer use the service less than 365 days, then the service year is the proceeding 365 days but the uptime in all days prior to the use of the service can be considered 00%. In the event of failing to achieve this uptime percentage, the customer will receive a credit of 0% of the bill excluding one-time payment for initiating the service. In Amazon Simple Storage Services (S3), the SLA offers 99.9% uptime. In case of violation the customer will receive a credit of 0% if the availability is greater than or equal to 99% and less than 99.9% and a credit of 25% if the availability is less than 99%. Table 2 shows the SLA of Amazon S3. Table 2: SLA of Amazon S3 Uptime % Credit% 99.0 U < U In Google App [] cloud services, the SLA ensures a service availability of at least 99.9% monthly. On the other hand, the customer will receive a different amount of credit for each violation. Table 3 shows the amount of credits for each level of availability in Google s App SLA. Table 3: SLA of Google App Monthly Uptime % Free days added 99.0 U < U < U < Many SLAs have a similar approach to the tabular Google SLA shown above: they offer a graduated penalty based on which level their SLA QoS violation falls in. A flat penalty is modeled with just one row in the table. 3. MONITORING AND MODELING SLAS 3. SLA Monitoring Framework Figure depicts our architecture for monitoring and enforcing an SLA. The figure centers the architecture around an IaaS virtual machine, although we envision Cloud Network I/F Cloud Storage I/F SLA Violation Events Figure : SLA Monitoring Architecture. that it could be reconfigured to, for example, monitor only IaaS storage resources by deploying the framework on a customer s machine that uses the storage resource. In addition to the customer s cloud application, we have the customer deploy an SLA Monitor component onto its cloud VM whose responsibility is to perform the SLA monitoring and report any violations. It receives measurement data from various s that are also installed on the VM and perform individual lowlevel monitoring and data gathering for the IaaS resources that the SLA encompasses. s might sometimes intercept actual cloud application operations and perform some measurement on them, such as the measuring the time it takes to complete storage requests in order to calculate storage bandwidth and latency performance. Such instruments might be placed outside or inside the cloud application, as the figure shows, depending on what is easier. Since this may interfere with application performance, an instrument could perform sampling and only occasionally incur such cost. s might also actively perform their own exercise of a resource in order to measure its current performance; for example, communicating with an external known host in order to measure the network bandwidth and latency. Such active resource exercising must of course be kept to a minimum in order to not incur both cost and application degradation. The figure shows some instruments residing simply in the VM itself such instruments might monitor VM performance, application VM usage, and other O/S-level measurements that can help inform the SLA Monitor on the current status of the cloud resource. In the figure, the SLA Monitor then sends notification events in case the SLA has been violated. These might be received by some customer host, but since the point of cloud computing is that the customer no longer 3

4 SLA +providername +username +costperperiod +timeperiod ServiceType Attribute MeasurementFunction +function measures Metric +value measures CompoundInequality +lowerbound +lbrelation +upperbound +ubrelation assessedfor Penalty +penaltyfunction +fixedpenalty +creditvaluepct +credittimepct +maxcreditpct +takereading() Figure 2: SLA Domain Model. needs to run and maintain their own hosts, the notification events will likely be sent elsewhere or in some other fashion. Possibilities include: send notifications to another cloud VM of the customer that is running an SLA Violation Reporter component (it might even be on the same VM), to a multi-customer trusted 3rd party violation reporter, or even through an report to the customer, who will manually report the violation to the cloud provider. Ultimately, the violation reporter should, either automatically or manually, report the violation to the cloud provider using the provider s violation reporting interfaces. Our monitoring framework must be very low overhead, since it is consuming cloud resources alongside the cloud application. We envision that data from the instruments is low frequency, and that evaluating new data to check for violations is not computationally intensive. Our goal is that the framework consumes less than % of the cloud resources, assuming a relatively active cloud application; if the cloud application is very quiescent then monitoring cost relative to the application might be significant, though in absolute terms still be very small. 3.2 Modeling the SLA Our SLA model is defined in this section using discrete math notation, with the UML domain model shown in Figure 2 also providing a graphical depiction of the relationships of the parts of the domain model. The entire SLA model is defined as a five-tuple, specifically s n SLA = {P, U, C, [t, t 2 ], {S i, A j }} () i= j= where P is the provider, U represents the user, C is the cost of the service over the period [t, t 2 ], S i is the service type or resource type such as system, and A j is a measurable attribute that the SLA specifies constraints over. The time period [t, t 2 ] is the contract period over which the SLA is evaluated. In current SLAs this is typically the one-month billing period; for any SLA violations during that period the provider may incur a penalty (such as a discount), but then the next billing period starts from a clean slate as far as SLA enforcement is concerned. Attributes are considered to be classified into service type categories, as shown in Figure 2, thus Equation shows the attributes collected and associated with a service type S i. For example, network availability is within the service type network, while storage response time is within the service type storage. This hierarchy is defined mostly for practical organization. Although commodity cloud providers generally have one SLA that they require their customers to agree with, our model defines the SLA as per user, so that a cloud provider might negotiate a unique SLA for each customer. The union over A j represents the set of attributes under the service type S i and its corresponding relations, and is defined by the formula: c A j = {a, ME, {LV k, LR k, UV k, UR k, PE k }}. (2) k= Where a is the attribute name under the service type S i such as network availability under the service type network, ME is a measurement function for the attribute, and the union represents the compound inequality that captures the SLA constraints on the attribute (see Figure 2). This compound inequality is intended to capture constraints such as those found in Table 3. Each tuple in the union models one row in the table. LV k is the lower bound value of the k th compound inequality for the attribute (i.e., the k th row), LR k is the relational operator for the lower bound, UV k is the upper bound value and UR k is the relational operator for the upper bound. The relational operators are defined as LR k, UR k {>,, <,,, =} An example of a full relation, for total system memory: (2G ME( total memory ) < 4G) 4

5 where LV k = 2G, LR k =, UV k = 4G, and UR k = <, and the attribute a = total memory. PE k is the penalty function for the attribute if a violation occurs in the k th compound inequality. This is capturing the different penalties associated with the rows in Table 3, which cannot be reduced to some single function and are thus modeled independently. Section 3.3 discusses the penalty calculation in depth. The measurement function ME of the attribute A j can be calculated as ME(A j ) = F (m,..., m q ) (3) where F (m,..., m q ) is a variable function that defines the attribute s value to be that computed by the function over possibly multiple metrics (see Figure 2). The idea here is that our monitoring instruments will collect fundamental base metrics which can then be used to compute higher-level attributes such as availability. The metrics will correspond to and be produced by the framework s monitoring instruments. These will then be combined into high level SLA attributes and evaluated according to our model. For example the two metrics: memory in use and free memory are considered metrics of the attribute total memory. While, total service hours and server downtime are considered the metrics of the server availability attribute. To evaluate the function F (m,..., m q ), the provider will follow certain mapping rules between each attribute and its corresponding valuation function. For example, if we denote the service type hardware by S, and suppose we have the following attributes under this service, a = total memory, a 2 = disk storage, and a 3 = server availability. Suppose that we can measure the attribute total memory a by the metrics memory in use (m ), and free memory (m 2 ). Also we can measure the second attribute disk storage a 2 by the two metrics used disk space (m ) and free disk space (m 2 ). To evaluate the measurement function ME(A j ) of the first two attributes, we have to specify a valuation function F. By applying the mapping rules for the attributes a and a 2 with its corresponding valuation function, we can define the valuation function of these attributes as: ME(a) = F (m, m 2 ) = V (m ) + V (m 2 ) = v + v 2. where V (m ) and V (m 2 ) are the measurement values of the metrics m and m 2, respectively of the attribute a, and v is the value obtained by V (m ) and it represents the amount of used memory or used disk, and v 2 is the value obtained by V (m 2 ) and it represents the amount of free memory or free disk space. These values can be obtained directly from the monitoring tool that measures these attributes. To measure the value of the third attribute server availability a 3, we need to have two metrics. The first one is total service hours m and the second one is server downtime m 2. The value of the total service hours V (m ) can be obtained by subtracting the start date and time of the service from the end date and time of the service t 2 t, while the value of the server downtime V (m 2 ) can be obtained from the monitoring tool. Then we can measure the server availability by ME(a) = F (m, m 2 )). Then after the mapping which can be done by the provider, we can define the valuation function of this attribute as F (m, m 2 ) = V (m ) V (m 2 ) V (m ) 00 = (v v 2 ) v 00 where v is the value obtained by V (m ) which represents the total service hours, and v 2 is the value obtained by V (m 2 ) which represents the server downtime. 3.3 The Penalty Function If one of the compound inequalities associated with an attribute is found to be satisfied e.g., a row in Table 3 is matched because availability has dropped into that range then the penalty associated with that row must be applied. Although the table shows simple constant penalties, current SLAs can have quite complex penalty functions, and so we model penalties as a piecewise function, described in this section. PE k is a function which represents the k th penalty in case of any violation occurred in the k th compound inequality of the attribute a. The penalty function PE k can be defined as a five-tuple by the formula: PE k = {VPE k, d k, CRV k, CRT k, MCR k } (4) where VPE k is the valuation function of the k th penalty. d k is a typed constant value that denote different kinds of penalties such as total number of days added to the service with no cost, as in the SLA of Google App shown in Table 3 above. This constant also may denote a fixed amount of money, or any other constraint or value which may depend on the service type and the attribute. This constant value or constraint should be defined clearly in the SLA if there is any need for it. CRV k is the credit value (percentage) corresponding to the k th compound inequality of the attribute a. CRT k is the credit time factor which associated with the credit value in the SLA. MCR k is the maximum value of credit that allowed to be given to the user, which is most of the time 00% of the monthly cost or fees. If a violation occurred in the attribute a and the k th compound inequality is true, then the provider must credit the customer s account with the specified amount of credit for that violation as stated in the SLA. Violation means that the quality of service guarantee is not satisfied or met. The valuation function of the penalty is defined in a piece-wise function as described in Figure 3. The val- 5

6 d k : if CRT k = 0 CRV k = 0 where d k is a typed constant CRV k C : if CRT k = 0 CRV k > 0 VPE k = min(t, (G (h)) : if CRT k > 0 CRV k > 0 where h = VIM CTP k T = MCR k C G = CRV k C VIM = ME(a) CTP k = CRT k TMB TMB is total billing minutes Figure 3: Penalty Function (5) uation function of the penalty has three pieces, each of which captures a common penalty formulation. The first is a simple constant, and is what is shown in our example in Table 3. The second piece captures the penalty as a fraction of the cost C of the service. The third captures the penalty as a function of the time T k that the SLA has been in violation. In case of non-temporal attributes, the first and the second piece of the valuation function is used. On the other hand the third piece will be used in case of temporal attribute such as availability. The particular values within the P E k tuple determine which piece to apply. In the first piece the value of the function will be the constant d k as explained above; since only d k is used, both the credit time CRT k and the credit value CRV k are equal to zero. The value of the function in the second piece will be a fraction of the cost of the service, i.e., the product of the credit value CRV k multiplied by the cost C; it is applied when the credit time CRT k is equal to zero, and the credit value CRV k is greater than zero. The third piece of the penalty function calculates a penalty such as 5% of the service cost for each 30 minutes of downtime, up to 00% of the service cost. In this piece, T is the maximum allowed penalty (e.g., 00% of the service cost), G is the penalty for each time unit of violation (e.g., 5% of service cost), and h is the number of time units of violation. We assume here that ME(a), the attribute metric is a percentage of time availability, thus ME(a) is the percentage of time in violation, from which we can calculate the total number of time units in violation, h. This proposed SLA model along with the penalty function described above captures most of services, attributes, and penalties that exist in the current realworld SLAs. It also can be extended easily to include any new QoS parameter or penalty which may be introduced in future SLAs. 4. EXAMPLE OF THE PROPOSED MODEL This section presents an example of how our model will be used to capture the SLA and then dynamically enforce the SLA agreement, in particular the penalty calculations. Suppose that we have a cloud provider company called Cloudspace, and this provider offers a IaaS compute service (e.g., a VM) for $0 a month. This provider offers QoS guarantees for the system availability as shown in Table 4. The provider will credit the customer account with $3 if the system availability (up-time) is between 99.5% and 99.9% during the monthly billing cycle excluding scheduled maintenance. This provider also guarantees to credit the customer account with 5% of the monthly cost or fee for each 30 minutes of system downtime up to 00% of the monthly fee, if the up-time is less than 99.5%. Table 4: SLA example Monthly up-time Amount of credit 99.5 U < 99.9 $3 0 U < % of the cost Suppose a user called Mike likes the services given by this provider and he wants to sign an SLA with this provider for the month of January in the year 202. To apply this example in our proposed model we will start from the SLA formula, introduced above, in equation : s n SLA = {P, U, C, [t, t 2 ], {S i, A j }} i= j= Then we can substitute the SLA parameters as the following: P = Cloudspace, U = Mike, C =$0, and the billing cycle or the interval of the service is [t, t 2 ] = [//202, /3/202]. S i = S = system, a = availability. Second, we will apply the attribute equation, introduced above, in Equation 2: c A j = {a, ME, {LV k, LR k, UV k, UR k, PE k }} k= 6

7 then we can rewrite the set A as A = { availability, ME, {{99.5%,, 99.9%, <, PE }, {0%,, 99.5%, <, PE 2 }}}. The attribute availability a has two metrics total service hours m and server downtime m 2. From the example, the violation s metric m 2 = server downtime, credit value is CRV k = 5%, credit time is CRT k = 30 minutes, monthly cost is C = $0, and the maximum credit percentage allowed is MCR k = 00%. Table 5 summarizes this SLA example. Table 5: SLA summarized example S i a LV k UV k CRV k CRT k VM Av. 99.5% 99.9% $3 0 VM Av. 0% 99.5% 5% 30 min To measure the attribute value we will use the measurement function, defined above, in Equation 3: ME(A j ) = F (m,..., m q ) Then after the mapping we can define the valuation function of this attribute system availability as ME(A j ) = V (m ) V (m 2 ) V (m ) 00 = (v v 2 ) v 00 where V (m ) is the total service time and V (m 2 ) is the system (VM) downtime. Suppose that the service duration as agreed upon in the SLA was one month, then total hours per month = 24 hours 7 days 4.33 weeks per month = 720 hours/month approximately which is V (m ). If the network was down for 5 hours in the month that means downtime V (m 2 ) = 5, then [ ] (720 5) ME = 00 = 99.3%. 720 We can see that this percentage falls in the second compound inequality because % < 99.5% as shown in Table 4. Now, we can check if the second compound inequality expression is true or not: 0% 99.3% 99.5% As we can see, the result of this expression is true, this means that the user will be eligible for a credit and the provider will be charged for this amount of credit. To calculate the amount of the credit we will use the penalty function PE k, declared above, in Equation 5. As stated in the SLA, which is shown in Table 5 above, the credit value CRV k = 5%, and the monthly fee or cost = $0, then G k = CRV k C = 5 0 = $ To calculate the value of the violation metric we will use the equation VIM = ME(a) = = The billing cycle is one month, Thus TMB = = 43200, then CTP k = CRT k TMB = Now, the total number of violations is h = VIM = = 0 = 0 CTP k = this means that the credit will be applied 9 times. In this case the mapping rule will use the third piece of the penalty function,introduced above, in Equation 5. T k = MCR k C = 00% 0 = $0 now, we will use the third part of Equation 5 to find the amount of penalty PE k = min(t k, (G k (h k ) = min(0, (0.5 0)) = min(0, 5) = $5 Thus, the customer will be eligible for a $5 refund from the total monthly billing fees, and the provider will lose this amount of credit by paying it back to the customer. 5. RELATED WORK There is much research in cloud computing monitoring; this research focuses on the main objectives that users of the cloud are looking to achieve while using or buying cloud products. These factors include security issues, performance metrics, disk storage, availability, scalability, throughput, efficiency, and many others. Cloud computing monitoring mainly aims to help manage these issues and ensure that the SLA covering them is maintained. Motohari [5] suggests that a third party cloud monitor should be used, such as Red Hat command center, to monitor the user s application and the provider s infrastructure according to the (SLA). Monalytics [] combines the ideas of monitoring and analysis, with the goal of monitoring a cloud and dynamically analyzing its performance in order to take corrective actions during runtime before detecting issues become larger problems. There has been significant work in this area of both formal modeling of SLAs and of monitoring cloud resources for SLA verification. Most of this work seems to be on the cloud infrastructure, or provider, side, with the goal of quickly detecting or even predictively avoiding SLA violations. As provider-side frameworks, these approaches can assume a far more intricate deployment, and e.g., some even work at the level of modified hypervisors []. The paragraphs below detail representative examples of previous work. 7

8 A QoS model is proposed by [5] which states that the QoS model consists of service provider, services, and resources where the providers can offer one or more services and should support hosting environment on their resources. The service can be executed on more than one resource. They define the SLA for each client or user as SLA i = {Q(t)}, where t [t, t 2 ], and Q(t) denotes the set of quality of service levels for each attribute Q i (t) = q (t), q 2 (t),...q n (t). Then they define the SLA specifically as SLA = {R, (A, value)}, where R is the set of relations, A is the set of attributes, and value is the value assigned to each attribute. Each relation must be verified and evaluated over a set of attributes. With the goal of preventing SLA violations of QoS guarantees before they occur, the Foundation of Self- Governing ICT Infrastructure (FoSII) [8] is a proposed novel monitoring model for mapping low level resource metrics such as CPU, disk storage, and memory with high level SLAs and does the monitoring at the execution time, which helps in achieving autonomic SLA management and prevents SLA violations. FoSII use a Low-level Metric to High-level SLA (LoM2HiS) framework, which works by monitoring infrastructure resources in the host monitoring stage and produces pair-metric values for each infrastructure component by using Gmond from Ganglia project and send them to the run-time monitoring stage, which can map each pair with the equivalent, predefined, high level SLA parameters. A simulation engine was developed by [4] to evaluate Knowledge Management techniques (KM) to help in resource management and SLA enforcement by using Case Based Reasoning (CBR) and decision making. This simulation was part of the work done by (FoSII) [8] which uses the LoM2HiS framework to monitor the cloud infrastructure. Case based reasoning is a technique used to solve a current case or problem by using solutions from similar cases that happened in the past. QoS guarantees in their work are represented by Service Level Objectives (SLOs) which are the component of the SLA. A proposed algorithm by [9] solved the problem of SLA-based resource allocation and optimize the total expected profit. There are three main factors that affect the profit, SLA satisfaction, penalties in case of violations, and the cost of energy. Their model is based on the SLA guarantees parameters and the multi-tier applications. An optimization algorithm proposed by [2] is used to prevent SLA violations and reduce the cost in case any violation occurs. Their research is an expansion of previous work about SLA conformance prediction and prevention based on event monitoring framework (PREvent). The main concern of the providers is to prevent SLA violations. Therefore they presented an approach to achieve that by predicting the violation s attribute at runtime. 6. CONCLUSION With the formal foundation of IaaS SLA modeling presented in this paper, our future work will involve building a framework that implements the vision in Figure. With this framework we will be able to experiment and validate or invalidate our ideas. Currently we are looking at the Policy Description Language (PDL, [3, 6]) to specify our SLA models in. PDL has a rich set of capabilities that allow one to describe constraint-based policies along with rules that define actions that are triggered on constraint violation. We can then build an automatic translator from PDL into an executable form. A good match for PDL is the online constraint solver oclingo [0], which allows new information to be entered (the online part) and a recomputation of the constraints to be undertaken automatically. Our instruments that continually produce new measurements of the cloud resources will feed their data into the oclingo program that embodies the SLA, and SLA violations will produce actions that generate an external event that can then be acted upon by another component. This is just one possible approach, and further research may lead us to build our SLA monitoring framework on other, more appropriate capabilities. In this paper we presented our ideas for monitoring IaaS cloud SLAs for potential violations. We take the view of supporting the customer in detecting SLA violations because many real SLAs require the customer to notify the provider that the SLA has been violated, and the customer will generally need an easy-to-deploy framework to do this with because they are not a cloud expert nor have low-level access to the cloud infrastructure. Our formal model for capturing SLAs, along with the penalty calculations, is the first step towards realizing this vision, and provides an important conceptual realization of cloud SLA ideas in its own right. 7. REFERENCES [] SLA in Google application. [Online; accessed 20-December-20]. [2] Hosting Solutions in rackspace [Online; accessed 0-March-20]. [3] SLA in amazon EC2 and Amazon S [Online; accessed 20-December-20]. [4] Nimsoft Monitoring Soultions [Online; accessed 20-April-20]. 8

9 [5] R. Al-Ali, O. Rana, G. Laszewski, et al. A model for quality-of-service provision in service oriented architectures. International Journal of Grid and Utility Computing, [6] R. Bhatia, J. Lobo, and M. Kohli. Policy evaluation for network management. In INFOCOM Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, volume 3, pages IEEE, [7] D. Durkee. Why Cloud Computing Will Never Be Free. ACM Queue, 8(4):20, 200. [8] V. C. Emeakaroha, I. Brandic, M. Maurer, and S. Dustdar. Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. In HPCS, pages 48 54, 200. [9] H. Goudarzi and M. Pedram. Multi-dimensional SLA-Based Resource Allocation for Multi-tier Cloud Computing Systems. In IEEE CLOUD, pages , 20. [0] T. Grote, T. Schaub, and B. Schnor. A reactive system for declarative programming of dynamic applications [] M. Kutare, G. Eisenhauer, C. Wang, K. Schwan, V. Talwar, and M. Wolf. Monalytics: online monitoring and analytics for managing large scale data centers. In ICAC, pages 4 50, 200. [2] P. Leitner, W. Hummer, and S. Dustdar. Cost-Based Optimization of Service Compositions. IEEE Transactions on Services Computing, pp(99), 20. [3] J. Lobo, R. Bhatia, and S. A. Naqvi. A Policy Description Language. In AAAI/IAAI, pages , 999. [4] M. Maurer, I. Brandic, and R. Sakellariou. Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning. In E. D. Nitto and R. Yahyapour, editors, Towards a Service-Based Internet - Third European Conference, ServiceWave, Ghent, Belgium, volume 648 of Lecture Notes in Computer Science, pages Springer, 200. [5] H. Motahari-Nezhad, B. Stephenson, and S. Singhal. Outsourcing business to cloud computing services: Opportunities and challenges. IEEE IT Professional, Special Issue on Cloud Computing, (2), [6] P. Patel, A. Ranabahu, and A. Sheth. Service Level Agreement in cloud computing. Cloud Workshops at OOPSLA,

How To Manage Cloud Service Provisioning And Maintenance

How To Manage Cloud Service Provisioning And Maintenance Managing Cloud Service Provisioning and SLA Enforcement via Holistic Monitoring Techniques Vincent C. Emeakaroha Matrikelnr: 0027525 [email protected] Supervisor: Univ.-Prof. Dr. Schahram Dustdar

More information

Dynamic Monitoring Interval to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said

Dynamic Monitoring Interval to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said Dynamic Monitoring to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said Abstract Service level agreement (SLA) is a contract between service

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com ` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and

More information

Towards Energy-efficient Cloud Computing

Towards Energy-efficient Cloud Computing Towards Energy-efficient Cloud Computing Michael Maurer Distributed Systems Group TU Vienna, Austria [email protected] http://www.infosys.tuwien.ac.at/staff/maurer/ Distributed Systems Group

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

Towards Autonomic Detection of SLA Violations in Cloud Infrastructures

Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Towards Autonomic Detection of SLA Violations in Cloud Infrastructures Vincent C. Emeakaroha a, Marco A. S. Netto b, Rodrigo N. Calheiros c, Ivona Brandic a, Rajkumar Buyya c, César A. F. De Rose b a Vienna

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures

Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Revealing the MAPE Loop for the Autonomic Management of Cloud Infrastructures Michael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, and Ivona Brandic Distributed Systems Group Institute of Information

More information

Service allocation in Cloud Environment: A Migration Approach

Service allocation in Cloud Environment: A Migration Approach Service allocation in Cloud Environment: A Migration Approach Pardeep Vashist 1, Arti Dhounchak 2 M.Tech Pursuing, Assistant Professor R.N.C.E.T. Panipat, B.I.T. Sonepat, Sonipat, Pin no.131001 1 [email protected],

More information

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads G. Suganthi (Member, IEEE), K. N. Vimal Shankar, Department of Computer Science and Engineering, V.S.B. Engineering College,

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,

More information

Towards an understanding of oversubscription in cloud

Towards an understanding of oversubscription in cloud IBM Research Towards an understanding of oversubscription in cloud Salman A. Baset, Long Wang, Chunqiang Tang [email protected] IBM T. J. Watson Research Center Hawthorne, NY Outline Oversubscription

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

Figure 1. The cloud scales: Amazon EC2 growth [2].

Figure 1. The cloud scales: Amazon EC2 growth [2]. - Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS

SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu

More information

Cloud SLAs: Present and Future

Cloud SLAs: Present and Future Cloud SLAs: Present and Future Salman A. Baset [email protected] IBM Research Abstract The variability in the service level agreements (SLAs) of cloud providers prompted us to ask the question how do

More information

Performance Management for Cloudbased STC 2012

Performance Management for Cloudbased STC 2012 Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS

More information

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11 Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Cloud Service Level Agreement

Cloud Service Level Agreement Cloud Service Level Agreement This Cloud Service Level Agreement is part of your Cloud Terms of Service. 1. DEFINITIONS The following definitions shall apply for purposes of this Cloud Service Level Agreement:

More information

Multifaceted Resource Management for Dealing with Heterogeneous Workloads in Virtualized Data Centers

Multifaceted Resource Management for Dealing with Heterogeneous Workloads in Virtualized Data Centers Multifaceted Resource Management for Dealing with Heterogeneous Workloads in Virtualized Data Centers Íñigo Goiri, J. Oriol Fitó, Ferran Julià, Ramón Nou, Josep Ll. Berral, Jordi Guitart and Jordi Torres

More information

Microsoft SQL Server 2014 Virtualization Licensing Guide

Microsoft SQL Server 2014 Virtualization Licensing Guide Microsoft SQL Server 2014 Virtualization Licensing Guide June 2014 Contents 1 Introduction 1 Quick Overview: Licensing SQL Server 2014 for Virtualization -Licensing Individual Virtual Machines -Licensing

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

Scheduling and Monitoring of Internally Structured Services in Cloud Federations

Scheduling and Monitoring of Internally Structured Services in Cloud Federations Scheduling and Monitoring of Internally Structured Services in Cloud Federations Lars Larsson, Daniel Henriksson and Erik Elmroth {larsson, danielh, elmroth}@cs.umu.se Where are the VMs now? Cloud hosting:

More information

WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI

WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI Sponsored by: Red Hat Tim Grieser Randy Perry October 2009 Eric Hatcher Global Headquarters: 5 Speen

More information

RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS

RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS RANKING THE CLOUD SERVICES BASED ON QOS PARAMETERS M. Geetha 1, K. K. Kanagamathanmohan 2, Dr. C. Kumar Charlie Paul 3 Department of Computer Science, Anna University Chennai. A.S.L Paul s College of Engineering

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Monitoring Elastic Cloud Services

Monitoring Elastic Cloud Services Monitoring Elastic Cloud Services [email protected] Advanced School on Service Oriented Computing (SummerSoc 2014) 30 June 5 July, Hersonissos, Crete, Greece Presentation Outline Elasticity in Cloud

More information

Performance Management for Cloud-based Applications STC 2012

Performance Management for Cloud-based Applications STC 2012 Performance Management for Cloud-based Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Key Performance Challenges in Cloud Challenges & Recommendations 2 Context Cloud Computing

More information

_experience the commitment TM. Seek service, not just servers

_experience the commitment TM. Seek service, not just servers The complete cloud Creating and preserving cloud savings, security and service quality transition planning and service management ABOUT THIS PAPER Creating and preserving cloud infrastructure savings,

More information

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS

Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Resource Allocation Avoiding SLA Violations in Cloud Framework for SaaS Shantanu Sasane Abhilash Bari Kaustubh Memane Aniket Pathak Prof. A. A.Deshmukh University of Pune University of Pune University

More information

Cloud based Conceptual Framework of Service Level Agreement for University

Cloud based Conceptual Framework of Service Level Agreement for University Cloud based Conceptual Framework of Service Level Agreement for University Krunal D. Trivedi Acharya Motibhai Patel Institute of Computer Studies, Ganpat University, Mehsana, Gujarat, INDIA N J. Patel,

More information

Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm

Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm Energy Conscious Virtual Machine Migration by Job Shop Scheduling Algorithm Shanthipriya.M 1, S.T.Munusamy 2 ProfSrinivasan. R 3 M.Tech (IT) Student, Department of IT, PSV College of Engg & Tech, Krishnagiri,

More information

Energetic Resource Allocation Framework Using Virtualization in Cloud

Energetic Resource Allocation Framework Using Virtualization in Cloud Energetic Resource Allocation Framework Using Virtualization in Ms.K.Guna *1, Ms.P.Saranya M.E *2 1 (II M.E(CSE)) Student Department of Computer Science and Engineering, 2 Assistant Professor Department

More information

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández

DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

Realize the Full Potential of Virtualized Java Applications

Realize the Full Potential of Virtualized Java Applications An Oracle White Paper April, 2010 Realize the Full Potential of Virtualized Java Applications Oracle WebLogic Server on Oracle JRockit Virtual Edition Oracle Virtual Assembly Builder The performance of

More information

The Next Evolution in Storage Virtualization Management

The Next Evolution in Storage Virtualization Management The Next Evolution in Storage Virtualization Management Global Storage Virtualization Simplifies Management, Lowers Operational Costs By Hitachi Data Systems July 2014 Contents Executive Summary... 3 Introduction...

More information

Cloud Computing Is In Your Future

Cloud Computing Is In Your Future Cloud Computing Is In Your Future Michael Stiefel www.reliablesoftware.com [email protected] http://www.reliablesoftware.com/dasblog/default.aspx Cloud Computing is Utility Computing Illusion

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

How To Use The Dcml Framework

How To Use The Dcml Framework DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach

ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall

More information

Li Sheng. [email protected]. Nowadays, with the booming development of network-based computing, more and more

Li Sheng. lsheng1@uci.edu. Nowadays, with the booming development of network-based computing, more and more 36326584 Li Sheng Virtual Machine Technology for Cloud Computing Li Sheng [email protected] Abstract: Nowadays, with the booming development of network-based computing, more and more Internet service vendors

More information

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity

The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity . White Paper The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity The cloud computing phenomenon is generating a lot of interest worldwide because of its potential to offer services

More information

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing

Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004

More information

Online Scheduling for Cloud Computing and Different Service Levels

Online Scheduling for Cloud Computing and Different Service Levels 2012 IEEE 201226th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum Online Scheduling for

More information

A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud

A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud Vivek Sridhar Rational Software Group (India Software Labs) IBM India Bangalore, India Abstract Cloud

More information

How To Model A System

How To Model A System Web Applications Engineering: Performance Analysis: Operational Laws Service Oriented Computing Group, CSE, UNSW Week 11 Material in these Lecture Notes is derived from: Performance by Design: Computer

More information

Elastic VM for Rapid and Optimum Virtualized

Elastic VM for Rapid and Optimum Virtualized Elastic VM for Rapid and Optimum Virtualized Resources Allocation Wesam Dawoud PhD. Student Hasso Plattner Institute Potsdam, Germany 5th International DMTF Academic Alliance Workshop on Systems and Virtualization

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration White Paper Published: August 09 This is a preliminary document and may be changed substantially prior to final commercial release of the software described

More information

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction

CS 695 Topics in Virtualization and Cloud Computing and Storage Systems. Introduction CS 695 Topics in Virtualization and Cloud Computing and Storage Systems Introduction Hot or not? source: Gartner Hype Cycle for Emerging Technologies, 2014 2 Source: http://geekandpoke.typepad.com/ 3 Cloud

More information

Choosing Between Commodity and Enterprise Cloud

Choosing Between Commodity and Enterprise Cloud Choosing Between Commodity and Enterprise Cloud With Performance Comparison between Cloud Provider USA, Amazon EC2, and Rackspace Cloud By Cloud Spectator, LLC and Neovise, LLC. 1 Background Businesses

More information

The Top 20 VMware Performance Metrics You Should Care About

The Top 20 VMware Performance Metrics You Should Care About The Top 20 VMware Performance Metrics You Should Care About Why you can t ignore them and how they can help you find and avoid problems. WHITEPAPER BY ALEX ROSEMBLAT Table of Contents Introduction... 3

More information

CLOUD SCALABILITY CONSIDERATIONS

CLOUD SCALABILITY CONSIDERATIONS CLOUD SCALABILITY CONSIDERATIONS Maram Mohammed Falatah 1, Omar Abdullah Batarfi 2 Department of Computer Science, King Abdul Aziz University, Saudi Arabia ABSTRACT Cloud computing is a technique that

More information

Integrating the customer experience through unifying software - The Microsoft Vision

Integrating the customer experience through unifying software - The Microsoft Vision VAASAETT - RESPOND 2010 Integrating the customer experience through unifying software - The Microsoft Vision Principal Author Andreas Berthold- van der Molen, Microsoft EMEA Contents The New Energy Ecosystem

More information

Amazon EC2 XenApp Scalability Analysis

Amazon EC2 XenApp Scalability Analysis WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2

More information

Cloud SLAs: Present and Future. Salman Baset [email protected]

Cloud SLAs: Present and Future. Salman Baset sabaset@us.ibm.com Cloud SLAs: Present and Future Salman Baset [email protected] 1 Agenda Why consider SLAs? Key components of a cloud SLA Cloud SLAs of Amazon, Azure, Rackspace, Terremark, Storm on Demand Storage and compute

More information

Cloud Computing Architectures and Design Issues

Cloud Computing Architectures and Design Issues Cloud Computing Architectures and Design Issues Ozalp Babaoglu, Stefano Ferretti, Moreno Marzolla, Fabio Panzieri {babaoglu, sferrett, marzolla, panzieri}@cs.unibo.it Outline What is Cloud Computing? A

More information

Service Design, Management and Composition: Service Level Agreements Objectives

Service Design, Management and Composition: Service Level Agreements Objectives Objectives! motivation for service level agreements! definition / measurement of levels! management of SLAs! formal representation 2 Content! definition! example! metrics! negotiation! optimization! monitoring!

More information

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment

Technical Paper. Moving SAS Applications from a Physical to a Virtual VMware Environment Technical Paper Moving SAS Applications from a Physical to a Virtual VMware Environment Release Information Content Version: April 2015. Trademarks and Patents SAS Institute Inc., SAS Campus Drive, Cary,

More information

CLOUD computing has emerged as a new paradigm for

CLOUD computing has emerged as a new paradigm for IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 7, NO. 3, JULY-SEPTEMBER 2014 465 SLA-Based Resource Provisioning for Hosted Software-as-a-Service Applications in Cloud Computing Environments Linlin Wu,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background The command over cloud computing infrastructure is increasing with the growing demands of IT infrastructure during the changed business scenario of the 21 st Century.

More information

Task Placement in a Cloud with Case-based Reasoning

Task Placement in a Cloud with Case-based Reasoning Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de

More information

CDBMS Physical Layer issue: Load Balancing

CDBMS Physical Layer issue: Load Balancing CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,

More information

Cloud Computing Capacity Planning. Maximizing Cloud Value. Authors: Jose Vargas, Clint Sherwood. Organization: IBM Cloud Labs

Cloud Computing Capacity Planning. Maximizing Cloud Value. Authors: Jose Vargas, Clint Sherwood. Organization: IBM Cloud Labs Cloud Computing Capacity Planning Authors: Jose Vargas, Clint Sherwood Organization: IBM Cloud Labs Web address: ibm.com/websphere/developer/zones/hipods Date: 3 November 2010 Status: Version 1.0 Abstract:

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT

DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT International Journal of Advanced Technology in Engineering and Science www.ijates.com DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT Sarwan Singh 1, Manish Arora

More information

A Survey on Load Balancing Technique for Resource Scheduling In Cloud

A Survey on Load Balancing Technique for Resource Scheduling In Cloud A Survey on Load Balancing Technique for Resource Scheduling In Cloud Heena Kalariya, Jignesh Vania Dept of Computer Science & Engineering, L.J. Institute of Engineering & Technology, Ahmedabad, India

More information

CS 695 Topics in Virtualization and Cloud Computing. Introduction

CS 695 Topics in Virtualization and Cloud Computing. Introduction CS 695 Topics in Virtualization and Cloud Computing Introduction This class What does virtualization and cloud computing mean? 2 Cloud Computing The in-vogue term Everyone including his/her dog want something

More information

SLA Business Management Based on Key Performance Indicators

SLA Business Management Based on Key Performance Indicators , July 4-6, 2012, London, U.K. SLA Business Management Based on Key Performance Indicators S. Al Aloussi Abstract-It is increasingly important that Service Level Agreements (SLAs) are taken into account

More information

An Autonomic Auto-scaling Controller for Cloud Based Applications

An Autonomic Auto-scaling Controller for Cloud Based Applications An Autonomic Auto-scaling Controller for Cloud Based Applications Jorge M. Londoño-Peláez Escuela de Ingenierías Universidad Pontificia Bolivariana Medellín, Colombia Carlos A. Florez-Samur Netsac S.A.

More information

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing

More information

Traditional Disaster Recovery versus Cloud based DR

Traditional Disaster Recovery versus Cloud based DR Traditional Disaster Recovery versus Cloud based DR May 2014 Executive Summary Many businesses want Disaster Recovery (DR) services to prevent either man-made or natural disasters from causing expensive

More information

Multilevel Communication Aware Approach for Load Balancing

Multilevel Communication Aware Approach for Load Balancing Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Optimizing the Cost for Resource Subscription Policy in IaaS Cloud

Optimizing the Cost for Resource Subscription Policy in IaaS Cloud Optimizing the Cost for Resource Subscription Policy in IaaS Cloud Ms.M.Uthaya Banu #1, Mr.K.Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional Centre

More information