AUTOMATIC PROXY GENERATION AND LOAD-BALANCING-BASED DYNAMIC CHOICE OF SERVICES
|
|
|
- Amice Howard
- 10 years ago
- Views:
Transcription
1 Computer Science 13 (3) Jarosław Dąbrowski Sebastian Feduniak Bartosz Baliś Tomasz Bartyński Włodzimierz Funika AUTOMATIC PROXY GENERATION AND LOAD-BALANCING-BASED DYNAMIC CHOICE OF SERVICES Abstract The paper addresses the issues of invoking services from within workflows which are becoming an increasingly popular paradigm of distributed programming. The main idea of our research is to develop a facility which enables load balancing between the available services and their instances. The system consists of three main modules: a proxy generator for a specific service according to its interface type, a proxy that redirects requests to a concrete instance of the service and load-balancer (LB) to choose the least loaded virtual machine (VM) which hosts a single service instance. The proxy generator was implemented as a bean (in compliance to EJB standard) which generates proxy according to the WSDL service interface description using XSLT engine and then deploys it on a GlassFish application server using GlassFish API, the proxy is a BPEL module and load-balancer is a stateful Web Service. Keywords proxy, load-balancer, load-balancing, automatic generation 45
2 46 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. 1. Introduction Workflow paradigm is becoming now a more and more popular model for solving business and scientific problems. To provide a complex functionality, there is a need to use different functional modules which can be organized into services. Such modules can have many instances working in a distributed environment, which implies that to achieve the best performance, load balancing needs to be used. This requires the capability of locating an indispensable service, choosing the best instance of the service and invoking it to have some function carried out. Moreover adding a further module to ensure a new behaviour should be easy. It would also be preferable to separate the design and development of such modules, which means that someone who wants to add a new functionality does not have to know how to place it into a working environment. Also extending the working system with existing modules should be easy and need no implementation changes. The system under discussion is aimed to solve the issues described above. The paper which addresses the above issues faced by the EU UrbanFlood project [1] is organized as follows. Related work is followed by the general system architecture and workflow management. Section 4 explains the concept and architecture of the proxy generator we exploit. Then the proxy BPEL module is discussed in Section 5. In Section 6, we present the architecture of a load-balancer and then details about the implemented load-balancing strategies. The tests performed on the proxy are presented in Section 7 and followed by conclusions and ideas for the future work. 2. Related work The issues of building and executing workflows is addressed in a vast number of papers [7], as well as load balancing in parallel and distributed programming [8]. The concept of load balancing with agent systems is addressed in a number of papers. Among them, [5] proposes that a multi-agent system may be used by the operating system to ensure that execution of all tasks on processors could be completed in the shortest possible time. In the realized multi-agent system each processor has an assigned agent which can communicate with agents on neighbouring nodes to exchange tasks. An exchange is performed whenever the agent has an excess as well as a lack of task. However, it is possible that neighbours are in the same situation, i.e., they have a lack or an excess of tasks, then the resident agent creates another type of agent which is aimed to find some tasks for a processor that suffers from a lack of tasks. The author of the HAProxy balancer describes in [11] various strategies of load balancing for applications accessible over network. Since the power of any server is finite, a web application must be able to run on multiple servers to accept an ever increasing number of users. The most popular one but also very effective algorithm is the DNS round robin [4]. The idea is that, if a DNS server has several entries for a given hostname, it will return all of them in a rotating order. Another strategy is to
3 Automatic proxy generation and load-balancing-based dynamic (...) 47 send a request to the first server to respond. It is also possible to choose always the least loaded server. The latter concept was enhanced in [10] where authors present a way how to monitor Web Services load and find out how big impact a single request has on the service load. The load balancer can adapt its behavior to a current service state, which means that, e.g., CPU or memory will have a greater impact on load indicator. The authors have decided to use Pearson s Correlation Coefficient to find a relationship between request duration and CPU load. All of the above approaches were considered when developing our load balancer. Some, like Pearson s Correlation Coefficient were introduced and tested in a real environment. 3. General architecture and workflow management The big picture of our research can be illustrated with the system architecture of the UrbanFlood project as shown in Fig. 1. DIKE SENSORS INTERNET COMMON INFORMATION SPACE (CIS) A-Type ServiceProxy LoadBalancer (LB) VirtualMachine(VM) with A-type service instance VM with A-type service instance VM with B-type service instance ProxyGenDeploy (PGD) UFoReg Cloud Monitoring HUMAN Figure 1. General idea of the system architecture of UrbanFlood. UrbanFlood is an Early Warning System (EWS) which can play a crucial role in mitigating flood risk by detecting conditions and predicting the onset of a catastrophe before the event occurs, and by providing real time information during an event. The components of EWS are organized into a workflow. The term workflow denotes a graph of tasks connected by control and/or data-flow dependencies. In our case, the source of the data are sensors located in a dike. The only one requirement to add a new sensor is connect it to the Internet which is used to send the collected data. Although a package from a sensor is received by the Common Information Space (CIS) a platform for hosting EWS s, it is not responsible for computing the data. CIS can send the request to a well known endpoint proxy which redirects the request for execution on a concrete service instance.
4 48 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. To increase its performance a service should have many instances but from the CIS point of view there is only one component responsible for request execution. Please note that a proxy is created for one type of service (more technically: for one interface) like a service is created for a specified purpose, e.g., one service is responsible for computing flood risk and another one for the visualization of water level. Proxy has two activities: first it should contact LoadBalancer (LB) to get a concrete service instance address and then it should redirect the request received from the CIS to this instance. A service can be the last node of the workflow, but it is not necessary. A cloud used to host services (one service per Virtual Machine (VM)) is monitored by the UFoReg system. LB queries UFoReg to get VM-related measurements. The data collected can be used to select the least loaded VM which hosts a specified service instance. 4. Automatic proxy generation and deployment At the beginning of our research we used the GlassFish ESB platform to generate proxy for services. Preparing a package ready for deployment on the application server is a complex process which requires a sequence of steps described coarse-grained below. 1. Create an empty BPEL module and copy to it files needed in each proxy module e.g. an LB WSDL file. 2. Copy a service WSDL and XSD files. 3. Create a BPEL [3] process sequence which generally consists of: receiving input data and assigning it to local variables, contacting LB to get service instance address, changing service endpoint address in the partner link, invoking the request and assigning its result to local variables, sending execution time to the LB and returning the result. 4. Create a Composite Application to deploy the proxy on the GlassFish server. 5. Deploy the prepared package. All these steps are the same for any type of service so we aim to automate this process. This automation was realized as an EJB service called ProxyGenDeploy (PGD). To easily understand the whole process, the PGD architecture (please see Fig. 2) can be helpful. It presents the whole flow responsible for generating and deploying proxy. PGD becomes a four arguments on input: service type, WSDL URL, input XSD URL, and output XSD URL. The steps that follow are: to download files from given URLs, then WSDL and XSD files are transformed (using the XSLT engine) to a BPEL module. After successful generation a JAR containing the BPEL module is created, which is next used to create a ready-to-deploy composite application packed into a ZIP archive. Nowadays PGD uses a dedicated GlassFish server to deploy proxies. The old proxy is stopped and undeployed (if exists) and the new proxy is deployed and started to
5 Automatic proxy generation and load-balancing-based dynamic (...) 49 Figure 2. Architecture of ProxyGenDeploy. do this, GlassFish API [2] was used. After these steps, the newly generated proxy is ready to use and is listening to incoming requests. No more steps are required. 5. Proxy Proxy provides a single well known endpoint, which acts to the underlying set of (dynamically provisioned) services, hidden below it. Note that a proxy is not created manually. It is generated by PGD and it is automatically deployed on the GlassFish server. It is required to have sun-bpel-engine installed on the target GlassFish server. Fig. 3 depicts a sequence diagram of request execution, which involves the following steps: 1. Receive a request from the CIS 1 of environmental phenomena through wireless sensors. 1.1 Query LB for a service url address LB chooses one of the registered services based on a specified strategy Proxy receives service s address. 1.2 Proxy uses Partner Link for contacting services and here a service endpoint is dynamically assigned to it. 1.3 Proxy gets a current time just before passing the request to the service. 1.4 Send request to the service. 1.5 Proxy receives operation results. 1 The CIS (Common Information Space), part of the Urban Flood project, is a generic framework for hosting Early Warning Systems based on the monitoring
6 50 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. 1.6 Proxy gets the current time just after receiving a response from the service. 1.7 Sending time statistics to the LB. 1.8 Return the operation results. External system Proxy LoadBalancer X Type Service Instance 1: Operation(args) 1.1: GetURLAddress(X) 1.1.2: String: URLAddress 1.1.1: GetConcreteUrl(X) 1.2: AssignEndpointReference 1.3: GetStartTime 1.4: operation(args) 1.5: Result 1.6: GetEndTime 1.8: Result 1.7: AddStatistic(X,URLAddress,StartTime,ResponseTime) Figure 3. Proxy instrumentation. Each unexpected failure (e.g. LB is not available, a service of a given type doesn t exist, etc.) will create an appropriate SOAP error message generated by the Proxy BPEL module. 6. Load balancer Fig. 4 presents the general architecture of LoadBalancer. The functionalities of the LB are listed and described following the figure. 1. Register/Unregister service instance. It is used to inform LB about new services. While adding a new instance, required are: service type name, VM id (unique for each one) and service address. 2. Add statistics. Used to collect data about execution times for each service. Such measurements are sent by the Proxy. 3. Get service address. Returns a concrete instance address using load balancing strategies. In order to choose the least loaded VM, LB uses a filtering mechanism. The Strategy pattern together with the Composite pattern were combined to ensure the flexibility and exchangeability of the load balancing algorithm. When get service address is invoked, the whole list of VMs of a given type goes on the
7 Automatic proxy generation and load-balancing-based dynamic (...) 51 1.Register/Unregister service instance 5.GetMeasurementsThread 4.Measurements registry 2.Add statistics 3.Get service address VM n VM n-1 Pearson s correlation 6. Figure 4. Architecture of LB. input of the chain of filters. After which step of filtering, the list of VMs shrinks and as a result only one VM is chosen, finally the address of this VM is returned. To facilitate understanding the above, an example process is illustrated in Fig. 5. Figure 5. Chain of filters. We have implemented three filters. The first one filters machines according to the count of running requests. The second one filters machines according to the average request time execution. The third one filters VMs according to their load indicator, which is a weighted average of CPU and memory usage. LB holds a reference to a single filter. Using Composite Filter other filters can be aggregated into the chain. Adding a new filter is very simple, it requires implementing a Filter interface. In the future it would be possible to create an XML configuration where a list of the used filters and their order could be stored. 4. UFoReg measurements. UFoReg(UrbanFlood Registry) is a database which collects VM-related measurements and publishes it using HTTP GET method. 5. GetMeasurements Thread. Because collecting VM-related measurements per request can be too expensive, we introduced a TimerTask which is called periodically (being configurable). It holds a list of registered VMs, through which it iterates during every execution to collect VM-related measurements. For each
8 52 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. VM it connects to UFoReg and collects measurements generated since the last execution up to now. The information gathered is then used to compute an average CPU usage, average memory usage, CPU usage weight and memory usage weight, the last two values are computed using Pearson s correlation. 6. Pearson s correlation. As mentioned, one of our filters used by LB assumes that the load indicator is calculated for each VM. We calculate the load indicator (li) as follows: li = CPU weight CPU load + MEMORY weight MEMORY load (1) The problem is how to determine the appropriate weights. We decided to find out how big impact each request has on CPU and memory load. Having collected the execution time for each request and corresponding CPU and memory average load, we can calculate Pearson s correlation. The correlation coefficient range is from 1 to 1. A value of 1 implies that a linear equation describes the relationship between X (request execution time) and Y (CPU or memory load) perfectly, with all data points lying on a line for which Y increases as X increases. A value of 1 implies that all data points lie on a line for which Y decreases as X increases. A value of 0 implies that there is no linear correlation between the variables. Having two vectors, where X are request execution times and Y are average cpu/memory loads: X 1 Y 1 X 2 Y 2 X = X 3.. X n Y = Y 3.. Y n we compute Pearson s correlation coefficient (r) as follows: (2) n (X i X)(Y i Y ) i=1 r = n ( Xi X ) 2 n ( Yi Y ) 2 (3) i=1 i=1 After that, the weights for CPU and memory are computed as follows: CPU weight = MEMORY weight = r cpu r cpu + r memory, (4) r memory r cpu + r memory Please note that owing to Pearson s correlation, load balancing will be better suited to the running system because weights are computed periodically.
9 Automatic proxy generation and load-balancing-based dynamic (...) Tests The LB mechanism was tested with one type of service. It has only one method which takes one argument (number of iterations) and performs many operations on floatingpoint numbers in each iteration. We had five instances of such services deployed at the ACK CYFRONET AGH computer. Physical machine parameters: Server name: HP ProLiant BL2 220c G5 CPU: 2 Intel Xeon L5420 (4 cores, 12M L2 Cache, 2.5 GHz, FSB 1333 MHz) Memory: 16 GB ( MB 667 MHz) Virtual machine parameters (one machine per service, each with the same configuration): 1 core Memory: 1 GB LB was configured as follows: the first filter was filtering the machines according to the count of requests running on it and it was leaving three machines on the list, the second one was filtering the machines according to the least response times and it was leaving two machines on the list, third one was filtering the machines according to a load indicator and it was leaving only one machine on the list. During the tests ten threads were sending requests to the proxy over five minutes. The first tests were performed with the number of iterations equal to In such a situation the average response time on the unloaded machine is about 37 seconds (Fig. 6). Figure 6. Average request duration with LB and without LB for number of iterations equal to 5000.
10 54 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. Figure 7. Load of VMs during tests for number of iterations equal to Fig. 7 presents how VMs were loaded during tests. The second series of tests was performed with the number of iterations equal to 500. In this situation the average response time on the unloaded machine is about 3.7 s (Fig. 8). Figure 8. Average request duration with LB and without LB for number of iterations equal to 500.
11 Automatic proxy generation and load-balancing-based dynamic (...) 55 Fig. 9 presents how VMs were loaded during tests. Figure 9. Load of VMs during tests for number of iterations equal to 500. The third series of tests was performed with the number of iterations equal to 50. In this situation the average response time on the unloaded machine is about 500 ms (Fig. 10). Figure 10. Average request duration with LB and without LB for number of iterations equal to 50.
12 56 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. Fig. 11 presents how VMs were loaded during tests. Figure 11. Load of VMs during tests for number of iterations equal to 50. As we can see, in each test better performance was achieved while using the implemented system. Figures 6, 8 and 10 present decrease of average service response time while using load balancer. As it was mentioned, each test was stopped after 5 minutes. During this time, more requests were processed using load balancer so line for the single VM is shorter. Values are lower for the lower number of requests because the machines were less loaded. Figures 7,9 and 11 present CPU load of each machine. The requests were distributed between machines which means that load balancer was working good. In Tables 1, 2 the experimental results are compared. number of iterations Table 1 Experimental results with load balancer requests count processed in 5 minutes without load balancer requests count processed in 5 minutes with load balancer Increase in performance % ,7 % ,7 % ,8 % We have tested how much faster the requests would be executed when using five VMs with LB vs. the case without LB (every request was delivered to the same instance of the service). It would be ideal if having 5 services we could execute 400%
13 Automatic proxy generation and load-balancing-based dynamic (...) 57 number of iterations Table 2 Experimental results without load balancer average request duration without load balancer [ms] average request duration with load balancer [ms] (a) (b) (a/b) , , ,89 Increase in performance more requests over the same time and obtain the average request duration five times lower w.r.t. to the case without LB. But in the real world it is almost unfeasible, because the requests are not equally distributed between VMs. The mechanism of choosing the least loaded machine takes also non-zero time, which extends the request execution duration. This can be observed using LB. The less a request execution time takes, the less requests are executed over the same time and the less is the increase of the average request duration. 8. Concluding remarks Our research addressing invoking services from within workflows allows to draw the following conclusions: Auto-generation and auto-deployment proxies for services is making work in the described environment easier and more comfortable. The first tests show that the implemented LB mechanism improves performance. We expect that further research should bring even better results. We noticed that LB strategies have to be suited to the environment in which it is used so it is necessary to try various LB strategies [9]. It means that before configuring LB the user should more or less know how many services would be used, how much time the average execution time will take and how often proxy would get requests. Having got such information it would be possible to try a couple of configurations to find out which one would provide the best performance. As LB is a single point of failure, in the future it may be necessary to introduce an agent-based approach [6]. Using this concept LB would involve many agents distributed across several nodes. The role of agents is to communicate with each other to choose the least loaded service of a given type.
14 58 Jarosław Dąbrowski, Sebastian Feduniak, Bartosz Baliś et. al. Acknowledgements Our thanks go to dr. Maciej Malawski for inspiring discussions. This work is partially supported by the EU UrbanFlood project no and by the European Union within the European Regional Development Fund program as part of the PLGrid Plus Project POIG /10 ( References [1] Urban flood [2] The openesb wiki. July [3] Ws bpel, version July [4] Bourke T.: Server Load Balancing. O Reilly, [5] Cetnarowicz K., Dreżewski R.: Maintaining functional integrity in multi-agent systems for resource allocation. Computing and Informatics, 29: , [6] Cetnarowicz K., Gruer P., Hilaire V., Koukam A.: A formal specification of m- agent architecture. In From theory to practice in multi-agent systems : second international workshop of Central and Eastern Europe on Multi-Agent Systems, CEEMAS 2001, pp , [7] Deelman E., Gannon D., Shields M., Taylor I.: Workflows and e-science: An overview of workflow system features and capabilities. Future Generation Computer Systems, 25(5): , [8] Janhavi B., Surve S., Prabhu S.: Comparison of load balancing algorithms in a grid. In Proc. of IEEE International Conference on Data Storage and Data Engineering (DSDE), Feb. 2010, Bangalore, India, pp , [9] Pinedo M. L.: Scheduling. Theory, Algorithms and Systems. Springer, [10] Porter G., Katz R. H.: Effective web service load balancing through statistical monitoring. Commun. ACM, 49(3):48 54, March [11] Tarreau W.: Making applications scalable with load balancing. art-2006-making_applications_scalable_with_lb.pdf, September Affiliations Jarosław Dąbrowski AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Electronics, Department of Computer Science, al. Mickiewicza 30, Krakow, Poland, [email protected] Sebastian Feduniak AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Electronics, Department of Computer Science, al. Mickiewicza 30, Krakow, Poland, [email protected]
15 Automatic proxy generation and load-balancing-based dynamic (...) 59 Bartosz Baliś AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Electronics, Department of Computer Science, al. Mickiewicza 30, Krakow, Poland, Tomasz Bartyński AGH University of Science and Technology, ACC Cyfronet AGH, ul. Nawojki 11, Krakow, Poland, Włodzimierz Funika AGH University of Science and Technology, Faculty of Electrical Engineering, Automatics, Computer Science and Electronics, Department of Computer Science, al. Mickiewicza 30, Krakow, Poland, Received: Revised: Accepted:
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure W lodzimierz Funika, Bartosz Jakubowski, and Jakub Jaroszewski Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059,
Development and Execution of Collaborative Application on the ViroLab Virtual Laboratory
Development and Execution of Collaborative Application on the ViroLab Virtual Laboratory Marek Kasztelnik 3, Tomasz Guba la 2,3, Maciej Malawski 1, and Marian Bubak 1,3 1 Institute of Computer Science
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
DataNet Flexible Metadata Overlay over File Resources
1 DataNet Flexible Metadata Overlay over File Resources Daniel Harężlak 1, Marek Kasztelnik 1, Maciej Pawlik 1, Bartosz Wilk 1, Marian Bubak 1,2 1 ACC Cyfronet AGH, 2 AGH University of Science and Technology,
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
A Case Based Tool for Monitoring of Web Services Behaviors
COPYRIGHT 2010 JCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 01, ISSUE 01, MANUSCRIPT CODE: 100714 A Case Based Tool for Monitoring of Web Services Behaviors Sazedul Alam Abstract Monitoring
JFlooder - Application performance testing with QoS assurance
JFlooder - Application performance testing with QoS assurance Tomasz Duszka 1, Andrzej Gorecki 1, Jakub Janczak 1, Adam Nowaczyk 1 and Dominik Radziszowski 1 Institute of Computer Science, AGH UST, al.
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU
Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE
PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India [email protected] 2 Department
Performance Analysis of Web based Applications on Single and Multi Core Servers
Performance Analysis of Web based Applications on Single and Multi Core Servers Gitika Khare, Diptikant Pathy, Alpana Rajan, Alok Jain, Anil Rawat Raja Ramanna Centre for Advanced Technology Department
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
Investigations on Hierarchical Web service based on Java Technique
Investigations on Hierarchical Web service based on Java Technique A. Bora, M. K. Bhuyan and T. Bezboruah, Member, IAENG Abstract We have designed, developed and implemented a hierarchical web service
Oracle Service Bus: - When to use, where to use and when not to use
Oracle Service Bus: - When to use, where to use and when not to use Session ID#: 244 Prepared by: Abhay Kumar Senior Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app Specialized.
Shoal: IaaS Cloud Cache Publisher
University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3
VIRTUAL RESOURCE MANAGEMENT FOR DATA INTENSIVE APPLICATIONS IN CLOUD INFRASTRUCTURES
U.P.B. Sci. Bull., Series C, Vol. 76, Iss. 2, 2014 ISSN 2286-3540 VIRTUAL RESOURCE MANAGEMENT FOR DATA INTENSIVE APPLICATIONS IN CLOUD INFRASTRUCTURES Elena Apostol 1, Valentin Cristea 2 Cloud computing
Six Strategies for Building High Performance SOA Applications
Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Development of Monitoring and Analysis Tools for the Huawei Cloud Storage
Development of Monitoring and Analysis Tools for the Huawei Cloud Storage September 2014 Author: Veronia Bahaa Supervisors: Maria Arsuaga-Rios Seppo S. Heikkila CERN openlab Summer Student Report 2014
Cisco Videoscape Distribution Suite Service Broker
Data Sheet Cisco Videoscape Distribution Suite Service Broker Product Overview Cisco Videoscape Distribution Suite Service Broker (VDS-SB) encompasses a broad range of capabilities, particularly in accelerating
Mobility Information Series
SOAP vs REST RapidValue Enabling Mobility XML vs JSON Mobility Information Series Comparison between various Web Services Data Transfer Frameworks for Mobile Enabling Applications Author: Arun Chandran,
ultra fast SOM using CUDA
ultra fast SOM using CUDA SOM (Self-Organizing Map) is one of the most popular artificial neural network algorithms in the unsupervised learning category. Sijo Mathew Preetha Joy Sibi Rajendra Manoj A
A NOVEL LOAD BALANCING STRATEGY FOR EFFECTIVE UTILIZATION OF VIRTUAL MACHINES IN CLOUD
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.862
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
BSPCloud: A Hybrid Programming Library for Cloud Computing *
BSPCloud: A Hybrid Programming Library for Cloud Computing * Xiaodong Liu, Weiqin Tong and Yan Hou Department of Computer Engineering and Science Shanghai University, Shanghai, China [email protected],
Data-Aware Service Choreographies through Transparent Data Exchange
Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition
Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...
Affinity Aware VM Colocation Mechanism for Cloud
Affinity Aware VM Colocation Mechanism for Cloud Nilesh Pachorkar 1* and Rajesh Ingle 2 Received: 24-December-2014; Revised: 12-January-2015; Accepted: 12-January-2015 2014 ACCENTS Abstract The most of
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
zen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
Full-text Search in Intermediate Data Storage of FCART
Full-text Search in Intermediate Data Storage of FCART Alexey Neznanov, Andrey Parinov National Research University Higher School of Economics, 20 Myasnitskaya Ulitsa, Moscow, 101000, Russia [email protected],
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department
Advancements in Storage QoS Management in National Data Storage
Advancements in Storage QoS Management in National Data Storage Darin Nikolow 1, Renata Słota 1, Stanisław Polak 1 and Jacek Kitowski 1,2 1 AGH University of Science and Technology, Faculty of Computer
Data Sharing Options for Scientific Workflows on Amazon EC2
Data Sharing Options for Scientific Workflows on Amazon EC2 Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Mehta, Benjamin P. Berman, Bruce Berriman, Phil Maechling Francesco Allertsen Vrije Universiteit
Efficient Load Balancing using VM Migration by QEMU-KVM
International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele
EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer
WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms
CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose,
A Framework for Personalized Healthcare Service Recommendation
A Framework for Personalized Healthcare Service Recommendation Choon-oh Lee, Minkyu Lee, Dongsoo Han School of Engineering Information and Communications University (ICU) Daejeon, Korea {lcol, niklaus,
Building Scalable Applications Using Microsoft Technologies
Building Scalable Applications Using Microsoft Technologies Padma Krishnan Senior Manager Introduction CIOs lay great emphasis on application scalability and performance and rightly so. As business grows,
CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Advances in Networks, Computing and Communications 6 92 CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content Abstract D.J.Moore and P.S.Dowland
Security Benefits of Cloud Computing
Security Benefits of Cloud Computing FELICIAN ALECU Economy Informatics Department Academy of Economic Studies Bucharest ROMANIA e-mail: [email protected] Abstract: The nature of the Internet is
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
Public Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA [email protected] [email protected]
Cloud services in PL-Grid and EGI Infrastructures
1 Cloud services in PL-Grid and EGI Infrastructures J. Meizner, M. Radecki, M. Pawlik, T. Szepieniec ACK Cyfronet AGH Cracow Grid Workshop 2012, Kraków, 22.10.2012 Overview 2 Different types of Compute
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
The MoCA CIS LIS WSDL Network SOAP/WS
MoCA/WS: A Web Service Personality of MoCA (Mobile Collaboration Architecture) Marcelo Malcher and Markus Endler Overview The main purpose of MoCA/WS is to allow non-java client programs to access and
Scalability Factors of JMeter In Performance Testing Projects
Scalability Factors of JMeter In Performance Testing Projects Title Scalability Factors for JMeter In Performance Testing Projects Conference STEP-IN Conference Performance Testing 2008, PUNE Author(s)
CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015
CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.
Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002
Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
Cloud deployment model and cost analysis in Multicloud
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud
Dynamic Resource allocation in Cloud
Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal
ADAPTIVE LOAD BALANCING FOR CLUSTER USING CONTENT AWARENESS WITH TRAFFIC MONITORING Archana Nigam, Tejprakash Singh, Anuj Tiwari, Ankita Singhal Abstract With the rapid growth of both information and users
An Efficient Application Virtualization Mechanism using Separated Software Execution System
An Efficient Application Virtualization Mechanism using Separated Software Execution System Su-Min Jang, Won-Hyuk Choi and Won-Young Kim Cloud Computing Research Department, Electronics and Telecommunications
Advancing Integration Competency and Excellence with the WSO2 Integration Platform
Advancing Integration Competency and Excellence with the WSO2 Integration Platform Dushan Abeyruwan Associate Technical Lead WSO2 Shammi Jayasinghe Associate Technical Lead WSO2 Agenda Fundamentals of
Dynamic resource management for energy saving in the cloud computing environment
Dynamic resource management for energy saving in the cloud computing environment Liang-Teh Lee, Kang-Yuan Liu, and Hui-Yang Huang Department of Computer Science and Engineering, Tatung University, Taiwan
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES Carlos Oliveira, Vinicius Petrucci, Orlando Loques Universidade Federal Fluminense Niterói, Brazil ABSTRACT In
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures
Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3
GENERIC DATA ACCESS AND INTEGRATION SERVICE FOR DISTRIBUTED COMPUTING ENVIRONMENT
GENERIC DATA ACCESS AND INTEGRATION SERVICE FOR DISTRIBUTED COMPUTING ENVIRONMENT Hemant Mehta 1, Priyesh Kanungo 2 and Manohar Chandwani 3 1 School of Computer Science, Devi Ahilya University, Indore,
Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003
Interconnect Efficiency of Tyan PSC T-630 with Microsoft Compute Cluster Server 2003 Josef Pelikán Charles University in Prague, KSVI Department, [email protected] Abstract 1 Interconnect quality
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
Experiments with Complex Scientific Applications on Hybrid Cloud Infrastructures
Experiments with Complex Scientific Applications on Hybrid Cloud Infrastructures Maciej'Malawski 1,2,'Piotr'Nowakowski 1,'Tomasz'Gubała 1,'Marek'Kasztelnik 1,' Marian'Bubak 1,2,'Rafael'Ferreira'da'Silva
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
FPGA area allocation for parallel C applications
1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University
Optimization of Cluster Web Server Scheduling from Site Access Statistics
Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments
Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
02267: Software Development of Web Services
02267: Software Development of Web Services Week 5 Hubert Baumeister [email protected] Department of Applied Mathematics and Computer Science Technical University of Denmark Fall 2015 1 Recap XML Schema Complex
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
Enhancing MapReduce Functionality for Optimizing Workloads on Data Centers
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,
