MELA: Monitoring and Analyzing Elasticity of Cloud Services
|
|
|
- Kory Hawkins
- 10 years ago
- Views:
Transcription
1 MELA: Monitoring and Analyzing Elasticity of Cloud Services Daniel Moldovan, Georgiana Copil, Hong-Linh Truong, Schahram Dustdar Distributed Systems Group, Vienna University of Technology {d.moldovan, e.copil, truong, Abstract Cloud computing has enabled a wide array of applications to be exposed as elastic cloud services. While the number of such services has rapidly increased, there is a lack of techniques for supporting cross-layered multi-level monitoring and analysis of elastic service behavior. In this paper we introduce novel concepts, namely elasticity space and elasticity pathway, for understanding elasticity of cloud services, and techniques for monitoring and evaluating them. We present MELA, a customizable framework that enables service providers and developers to analyze cross-layered, multi-level elasticity of cloud services, from the whole cloud service to service units, based on service structure dependencies. Besides support for real-time elasticity analysis of cloud service behavior, MELA provides several customizable features for extracting functions and patterns that characterize that behavior. To illustrate the usefulness of MELA, we conduct several experiments with a realistic data-as-a-service in an M2M cloud platform. Keywords-elastic computing, cloud service, elasticity monitoring, elasticity analysis I. INTRODUCTION With the increasing popularity of cloud systems, the number of applications and systems born in or migrated to cloud environments has substantially increased. Diverse types of stakeholders in cloud environments, ranging from business oriented software providers to e-science professionals, have continuously investigated techniques exposing diverse functionalities as a service (XaaS). In this context, substantial effort have been paid for the development of emerging elastic cloud services, which scale up/out as long as the workload is high, and scale back in/down when possible, reducing cost while maintaining performance and quality. Going beyond the traditional elastic scalability which concentrates on scaling in/out resources to achieve performance, in general, elastic cloud services have three main dimensions: resource elasticity, cost elasticity and quality elasticity [1]. Developing and managing elastic cloud services with such multi-dimensional elasticity is challenging. One of the main questions is how to monitor and evaluate cloud service s elastic behavior, determine the proper cost and quality indicators and their boundaries, and utilize them for optimizing and controlling the services elasticity. Currently, the process of deciding cost and quality indicators and their boundaries is somewhat of a black art, usually done by cloud experts. Existing monitoring and analysis tools focus either on cloud service level [2] or on This work was partially supported by the European Commission in terms of the CELAR FP7 project (FP7-ICT #317790) the underlying virtual infrastructure [3][4], and do not provide a cross-layered, multi-level service elasticity behavior picture, hindering the discovery of the cause for stakeholder goal s violations. For controlling elastic cloud services one must be able to detect if a goal violation originates in a poorly chosen cloud service, subscription scheme, resource congestion, or failing service unit. In particular, we think that in order to understand elastic cloud services, we need to investigate new concepts that can be used to characterize and extract cloud service s elastic behavior from multi-dimensional monitoring data. In this paper, we present MELA, a framework for monitoring and analyzing elasticity of cloud services. MELA allows cloud service developers and providers to trace their service behavior from the whole service level to the underlying virtual infrastructure, extracting characteristics and providing crucial insight in their elastic behavior. Providing aggregated monitoring data and analysis of elastic cloud services, MELA acts as a base for analyzing and controlling elastic cloud services. The main contributions of our paper are: a novel concept of elasticity space and elasticity pathway for analyzing elastic behavior of cloud services at multiple levels. customizable mechanisms for extracting runtime boundaries of cloud service s elasticity that fulfill user-defined elasticity requirements. techniques for evaluating multi-level user-defined elasticity requirements over service cost, quality and resources, enabling custom analysis of cloud services elastic behavior. The rest of this paper is structured as follows. Section II presents the motivation and research problems. Section III presents our techniques for monitoring and analyzing elasticity of cloud services using the elasticity space and pathway. In Section IV we describe the MELA framework. Section V presents our prototype and experiments. We discuss related work in Section VI. Section VII concludes the paper and outlines the future work. II. MOTIVATION & RESEARCH PROBLEMS Let us consider a realistic data-as-a-service (DaaS) application for an M2M cloud platform-as-a-service, for which we have user-defined elasticity requirements 1 w.r.t service run- 1 In this paper users refer to the users of our framework: cloud service provider and developer and elasticity controllers
2 Fig. 1: Elastic Cloud Service Views time performance and cost. In general, we have three main views from which cloud services are described (Fig. 1): (i) design-time view, where we see the whole service dependency model (Cloud Service, Service Topology, Service Unit) and user-defined service requirements, (ii) run-time view, where instances of several Service Units are deployed and executed in virtual machines, and (iii) the virtual infrastructure, where several virtual machines, possibly grouped in virtual clusters, are used. From the design-time point of view, the DaaS has two service topologies, Data End and Event Processing, supporting horizontal scaling by addition and removal of VMs. The Data End service topology includes two service units, a Data Node holding data, and a Data Controller managing it. The Event Processing service topology also contains two service units: Load Balancer, distributing client requests, and Event Processing interacting with the Data End. At run-time, the Data End units uses Cassandra 2 for its service units, and the Event Processing uses HAProxy 3 for its Load Balancer service unit. Moreover, at run-time, due to user-defined elasticity requirements, service unit instances are added/removed dynamically, triggering allocation and deallocation of virtual machines at the virtual infrastructure level. User-defined service requirements can be viewed as elasticity requirements, as they restrict the elastic behavior of the DaaS. To enforce such restrictions at the virtual infrastructure level, i.e. when to add/remove a VM, of what type, under which pricing scheme, the restrictions need to be linked and mapped to the run-time view. Monitoring data from the run-time view must also be linked back to the user-defined elasticity requirements. This enables the discovery of service units belonging to service topologies that cause requirements violations. For example, using MELA, one should be able to determine that a high service cost is caused by to few clients served at the Event Processing service topology level because of overloaded Event Processing service unit instances, or high communication latency between the Event Processing instances and the Data Controller. While using various monitoring techniques such as [4] or [5] we can capture monitoring data from the whole service level or virtual infrastructure level, such data typically does not answer the following crucial questions: what should be the behavior of the service topologies and units when user-defined elasticity requirements are fulfilled when is the service behavior elastic, i.e. adapting and fulfilling user-defined elasticity requirements what is the cause of an elasticity requirement violation, traced from the design-time view to the underlying virtual infrastructure how does the service elastic behavior evolve in time, i.e. what are the correlations and patterns in the service behavior Capturing, describing and analyzing elastic behavior of cloud service is crucial not only for developers who build and optimize cloud services, but also for software controller that change the topology of such services at run-time, enforcing user-defined elasticity requirements. Such controllers need a monitoring and analysis mechanism that extracts elasticity characteristics, which can be used to refine user-defined elasticity requirements or predict the service behavior, leading to better service control and quality. This motivates us to investigate the following issues: Which concepts can be used to capture the elastic behavior of cloud services? How to extract characteristics that describe the service elastic behavior to support both reactive and predictive control of elastic services? How to analyze the cloud service behavior, detecting the source of user-defined elasticity requirements violations? This paper focuses on capturing the properties of elastic services at multiple levels, providing support for analyzing their behavior from multiple views, and characterizing the elastic behavior of each cloud service based on user-defined elasticity requirements. III. MONITORING AND ANALYZING ELASTIC CLOUD SERVICES A. Runtime Properties of Elasticity of Cloud Services In order to support multi-dimensional analysis of elastic services behavior [1], we categorize monitoring data in three dimensions: Cost, Quality and Resource. Each dimension has a set of metrics, shown in Figure 2. These categories are sufficient for capturing low-level data about any monitored
3 Definition 2. An elasticity space captures all runtime metrics described in the user-defined elasticity boundary when a monitored element is in elastic behavior, which is determined via an elasticity space function. Fig. 2: Elasticity Dimensions element (e.q., service topology or service unit) within a cloud service that can be used for understanding the elastic behavior of that service. Conceptually, to capture monitoring data associated with a monitored element at a specific time t, we define the monitoring snapshot, ms: ms = ( c i, q j, r k, t) (1) where c i Cost, q j Quality, and r k Resource. Monitoring snapshots capture metrics, but do not provide information about boundaries over the metric s values in which user-defined elasticity requirements are fulfilled. Therefore, in order to analyze the elastic behavior of a monitored element, we represent metric boundaries extracted from user-defined elasticity requirements as well as boundaries detected/evaluated from our monitoring techniques using the elasticity boundary: Definition 1. An elasticity boundary describes the upper and lower bound over a set of metrics for a monitored element. Conceptually, an elasticity boundary elboundary is: elboundary = ( c u i, c l i), q u j, q l j), r u k, r l k) ) (2) where c u i and cl i denote the upper bound and the lower bound of metric c i, respectively, qj u and ql j for q j, and rk u and rl k for r i. All metrics c i, g j, r k are specified in elasticity requirements indicating the parameters under which the cloud service is elastic. In the rest of this paper, user-defined elasticity boundary and evaluated elasticity boundary are used to indicate the boundary extracted from user-defined requirements and determined from elasticity monitoring, respectively. B. Elasticity Space and Pathway Given a set of monitoring snapshots and a user-defined elasticity boundary, we need to understand when a monitored element is in elastic behavior, if its behavior violates the elasticity boundary and if we can characterize the service behavior using some specific pathways. Naturally, we expect that the meaning of elasticity will be dependent on the types of monitored elements, their runtime settings and requirements. To this end, we define the concept of elasticity space to determine if a monitored element is in elastic behavior: Formally, let f elspace be an elasticity space function, MS = {ms i } be the set of monitoring snapshots, then an elasticity space elspace can be defined as: elspace = f elspace (MS). A f elspace has to perform two steps: detect when an elastic behavior starts and stops, and extract only monitoring data describing the service behavior while respecting the userdefined elasticity boundaries. In principle, there could be several elasticity space functions, which can be developed for and applied to different types of monitored elements, such as specific types of service units, service topologies, or the whole cloud service. Furthermore, these functions are also dependent on the metrics in user-defined elasticity boundaries. An elasticity space function is designed to extract useful information about the overall behavior of the cloud service when elasticity requirements are fulfilled. A space would contain, for example, only the throughput and cost/v M/h metrics from which the servicecost/client/h targeted by requirements can be extracted, not including metrics that have no impact on it. One can analyze the behavior of an elastic cloud service by checking if its elasticity space is within the user-defined elasticity boundaries. While the elasticity space enables cloud service elasticity analysis, it does not provide insight into relationships between metrics influencing the elastic behavior over time, e.g. throughput and cost/v M/h might or might not follow a linear relationship. In order to characterize the elastic behavior from specific views/perspectives over a cloud service, we define the concept of elasticity pathway. Definition 3. Given a specific view on metrics V = {m 1, m 2,, m n }, an elasticity pathway for V characterizes the elasticity relationship among m i over the time. Formally, an elasticity pathway elp tw is extracted by a function f elp tw which takes as input an elasticity space elspace and a view V over the space s metrics, and returns another function describing behavioral patterns or characteristics of the the monitored element: elp tw = g(v ) = f elp tw (elspace, V ). Various elasticity pathway functions can be defined over the elasticity space, enabling space analysis from multiple perspectives. An elasticity pathway function is designed to perform a complex evaluation of the cloud service behavior, extracting characteristics that can be used to predict future behavior. One function could extract metric correlations, e.g. between throughput and cost/v M/h for a service unit, determining the influence of throughput on the cost. Another function could classify the cloud service behavior in usual and unusual combinations of metric values. The elasticity pathway function is applied to extract behavioral characteristics of monitored elements from the elasticity space, the quality of the extracted elasticity pathway being heavily influenced by the size and
4 Fig. 3: Association between Elasticity Space/Pathway and Monitored Elements data in the elasticity space. C. Multi-Level Elasticity Space of Cloud Services In order to monitor and evaluate the elasticity space and pathways of a cloud service, we need to (i) build the cloud service dependency model, (ii) build the monitoring snapshot for all monitored elements, and (iii) apply particular elasticity space and pathway functions over the monitoring snapshots. 1) Elastic Cloud Service Dependency Model: For describing elastic services from the whole service level to the underlying virtual infrastructure, we need an abstract representation model that enables the decomposition of user-defined elasticity requirements in lower level requirements which can be mapped to the underlying virtual infrastructure. To support analysis of service behavior at different levels, we represent a cloud service as composed of service topologies, each topology containing several service units, which are deployed on one or more virtual clusters running virtual machines (Figure 3). Based on the dependency model, we build composite monitoring snapshots which aggregate metrics bottom-up, creating based on lower level metrics higher level ones which can be targeted by user-defined elasticity requirements. At different levels we allow the association with different elasticity space and pathway functions, enabling custom analysis of cloud service behavior at multiple levels. Using the dependency model we combine monitoring snapshots, elasticity spaces and pathways from one level and propagate them to the other levels, obtaining a complete view over the cloud service behavior. To build the elasticity space, the dependency model of the cloud service is extracted or defined by users/tools, and used for analyzing the service behavior. For easy integration with other tools, we use an XML-based representation. Listing 1 shows the M2M DaaS containing two service topologies and their service units. Listing 1: Example of M2M DaaS Dependency Model <CloudService id = S name= M2MDaaS > <ServiceTopology id = ST1 name= E v e n t P r o c e s s i n g > <S e r v i c e U n i t id = ST1 SU1 name= LoadBalancer /> <S e r v i c e U n i t id = ST1 SU2 name= E v e n t P r o c e s s i n g /> </ ServiceTopology> <ServiceTopology id = ST2 name= DataEnd > <S e r v i c e U n i t id = ST2 SU1 name= D a t a C o n t r o l l e r /> <S e r v i c e U n i t id = ST2 SU2 name= DataNode /> </ ServiceTopology> </ CloudService> 2) Cross-layered Metric Composition: Monitoring snapshots capture (low-level) metrics, but not necessary the same as elasticity requirements defined by the user. For example, a monitoring snapshot for the Event Processing service unit might only include responset ime, throughput and cost/v M/h while the elasticity requirements might target servicecost/client/h and numberof Clients. Therefore, to obtain a complete view over the cloud service behavior, from low level metrics to higher ones, we develop techniques for cross-layer composition of monitoring snapshots, elasticity spaces and elasticity pathways, following the cloud service structure. This composition introduces the problem of combining/aggregating metrics. Depending on the types of metrics, a valid composition of two metrics might involve different operations. We define an XML-based domain-specific language for describing such metric composition rules as a cascading sequence of operations which apply one or more operators over one or more operands. Defining the composition rules requires domain specific knowledge, e.g., in determining that the cost of a service unit is computed from the hourly cost per VM instance and the network data transfer. Based on the metric composition, we provide an analysis mechanism for extracting the elasticity space and pathway at different dependency model levels, providing a multi-level decomposition of the cloud service behavior. Such a decomposition is beneficial to service controllers, which can use our approach to detect which monitored element from which service dependency model level violates service requirements, and reason in terms of metrics located at that particular level. Providing a complete view over the behavior of cloud services enables service provider/developer and software controllers to reason on the same service using separate perspectives. In Listing 2 we show a composition rule obtaining the cost of data transfered per client per hour for the Data Listing 2: Example of Metric Composition <CompositionRules TargetLevel = ServiceTopology > <CompositionRule TargetID = ST1 > <SourceMetric name= dataout unit = GB/ s l e v e l = S e r v i c e U n i t /> <Operations> <Operation name= SUM /> <Operation name= DIV unit = no / s sourcemetric = numberofclients l e v e l = S e r v i c e T o p o l o g y /> </ Operations> <R e s u l t i n g M e t r i c name= d a t a C o s t P e r C l i e n t u n i t = $ type = COST /> </ CompositionRule> </ CompositionRules>
5 Algorithm 1 Multi-Level Elasticity Space/Pathway Analysis FUNCTION ana lyz e ( element ) elpathways, subsnapshots := [ ] elspace, monsnapshot : = NULL FOR EACH c h i l d IN e l e m e n t. c h i l d r e n DO s u b S n a p s h o t s. push ( a n a l y z e ( c h i l d ) ) FOR EACH r u l e IN element. compositionrules DO v a l u e s := [ ] FOR EACH operand IN r u l e. operands DO IF operand. type IS m e t r i c THEN v a l u e s. push ( get Valu e ( operand, subsnapshots, monsnapshot ) ) ELSE v a l u e s. push ( operand ) END IF FOR EACH o p e r a t o r IN r u l e. o p e r a t o r s DO v a l u e s := o p e r a t o r ( v a l u e s ) monsnapshot. push ( v a l u e s ) e l S p a c e := e l e m e n t. e l S p a c e F u n c t i o n ( monsnapshot ) FOR EACH elptwfunc IN e l e m e n t. e l P t w F u n c t i o n s DO elpathways. push ( elptwfunc ( elspace ) ) End service topology. The metric is obtained by summing up the values of the dataout metric from all service topology children having level service unit, and dividing the result with the value of the numberof Clients metric retrieved from the target service topology. 3) Multi-level Elasticity Space/Pathway Analysis: Following the service dependency model, Algorithm 1 traverses the model in a depth-first manner and carries out runtime analysis. For every element at each level, its metric composition rules are applied, building a multilevel monitoring snapshot. Each composition rule contains a set of operands (metrics or values) and a set of operations from {sum, max, min, avg, div, add, sub, mul, concat, union, set, keep, keep last, keep first}. Over the space we apply the elasticity pathway functions, analyzing the cloud service behavior. IV. ELASTICITY MONITORING AS A SERVICE A. MELA Overview Based on our concepts in Section III, we develop MELA, elasticity space monitoring and analysis as a service (Fig. 4). MELA contains a core MELA Service, and a lightweight Data Collector node. The Data Collector node is a customizable component that gathers from existing monitoring solutions data associated with a dependency model level or monitored element (e.g., responset ime or throughput for the Event Processing service topology), and sends it for processing and analysis to the MELA Service. Monitoring data is usually associated with a single level, e.g., virtual infrastructure, service topology or service unit. An important MELA feature is the linking of these levels, which implies a configuration step using the Elasticity Functions Fig. 4: MELA Overview Management API, defining for the monitored elements at each level the composition operations to be applied. This step feeds data into the El. Pathway & El. Space Functions repository which also contains the composition rules for building the monitoring snapshot. As the elasticity space is determined from monitoring snapshots, the El. Space Management unit also handles the monitoring snapshot construction and stores them in the Monitoring & El. Space Snapshots database. MELA exposes its functionality through REST services and Java API, providing methods for configuring MELA and analyzing elastic service behavior. B. Elasticity Space and Pathway Function Prototypes In the current MELA prototype, we implement an elasticity space function which, starting from the user-defined elasticity requirements for the whole cloud service, records as space boundaries for all service topology and service unit monitored elements, their maximum and minimum encountered metric values when the user-defined elasticity requirements are respected. Based on the elasticity space, custom elasticity pathway functions can be defined as MELA plug-ins, enabling custom analysis of service behavior. For the prototype elasticity pathway function, we adapt an unsupervised behavior learning technique using self organizing maps (SOMs) [6], and classify monitoring snapshots by encountering rate in DOMINANT, NON-DOMINANT, and RARE. Such a pathway is important for understanding if the regular behavior of the service respects user-defined elasticity requirements. As SOMs are unsupervised neural networks that map multidimensional spaces into low dimensional ones, we use them for grouping monitoring snapshots. Each SOM s neuron value is derived from its snapshots. Each monitoring snapshot is mapped to the group from which it has the smallest distance.
6 Fig. 5: MELA Visualization of Multi-Level Monitoring Data With each new snapshot, the group and its SOM neighbors are updated using the function V new (group) = V old (group) + A N(group)(V (snapshot) V old (group)), where A is a discount factor, and N(group) is a neighborhood function determining the degree with which a group value is updated. We initialize the SOM with snapshot groups having all metrics equal to 0, and rely on its self-adaptive nature to map the input data. We use a neighborhood function of 1 for the directly targeted group and of 1/neighbourLevel/neighboursCount for the group neighbors. Updating the neighbors creates and update new groups, mapping the input data better. The discount learning factor is 1/neighbourLevel, the neighborhood is 2 and the map size is A filtering step merges groups with same value, consolidating the monitored snapshots. V. EXPERIMENTS We apply MELA 4 to monitor and analyze the realistic data-as-a-service application for an M2M cloud mentioned in Section II. From real sensor data, we simulated a Gaussian distribution of M2M sensors the clients connected to our system, starting from 50 sensors per hour, increasing up to 350, and then decreasing again. Each request from a sensor will require between 1 and 10 operations on the data service. For practical reasons we simulated a hour of experiment each second. The service VMs were deployed on our OpenStack 5 cloud. For these experiments MELA utilizes Ganglia 6 as base for the Data Collector nodes, retrieving generic OS level and service specific monitoring data (e.g., numberofclients, throughput, response time) from custom Ganglia plug-ins. A. Monitoring Elasticity Space We start from the scenario in which the cloud service provider wants to monitor and define elasticity requirements 4 Detailed MELA API, prototype implementation, and experiments can be found at for the service cost and performance. Using our cross-layered metric composition mechanism, we derive service level metrics from low level ones. We start at the Service Topology level defining the cost based on vmcount (number of service unit instances) and the cost per virtual machine (assumed 0.12 EUR per machine per hour). Summing up at the Service Level the cost obtained from the Service Topology level, we obtain estimated hourly service cost. To monitor the service performance, we define multiple metrics, averaging the number of service numberofclients/h (active connections), responsetime and throughput at every Service Unit level and propagating them to the upper service dependency model levels. For monitoring the service cost efficiency, a metric is defined at service level, dividing the cost by the value of the numberofclients/h metric, obtaining the estimated cost/client/h. Figure 5 presents the MELA cross-layer metric monitoring snapshot obtained from composing and propagating low level metrics. Obtaining higher-level composite metrics, the service controller can define user-defined elasticity requirements on them, analyze if they are fulfilled, and, if not, enforce them by adding/removing VMs to/from service unit instances. B. Elasticity Space Analysis The second feature of MELA is the elasticity space analysis, which determines what are the behavioral boundaries in which the service fulfills supplied requirements. Continuing with the previous scenario, the cloud service provider wants to implement a 2.5$ monthly subscription for each service client (sensor). Using MELA, the provider can monitor the service elasticity behavior (via metrics) at each service level, to guarantee he/she does not end up paying more than 2.5$ per month per client to the cloud provider. Assuming a month of 30 days each with 24 hours, the elasticity requirement is a cost of at most $ per served client per hour. Using our elasticity space function prototype, we determined the elasticity space, including the maximum and minimum encountered values for the service metrics in which the service
7 Fig. 7: Elasticity Pathway of CloudService cost/client/h (a) Elasticity Space Snapshot (b) Elasticity Space numberofclients Dimension Fig. 8: Dominant Elasticity Pathway of Event Processing Service Topology (c) Elasticity Space responsetime Dimension Fig. 6: Elasticity Space for Event Processing Service Topology requirements are fulfilled, for each service level and monitored element. From the snapshot of the elasticity space for the Event Processing Service Topology (Fig. 6a), one can examine how individual metrics evolve over the time. For example, we analyze the elasticity space numberofclients dimension, marking with flat lines the minimum and maximum acceptable values (Fig. 6b). The numberofclients minimum is 172, which multiplied by , gives a 0.48$ per hour, indicating that the service uses at least 4 VMs at 0.12$ per hour. From this evaluated elasticity boundary we can deduce that given the current service control strategy, there should be at least 172 clients per hour to justify the cost of running in cloud. To learn more about the service behavior and what are the boundaries the service controller should enforce on different levels, boundaries are also extracted for the responsetime describing the time to process a request, and throughput which describes the number of operations performed by the service per second (a client can perform many operations). Focusing on responsetime (Fig. 6c), MELA extracts a minimum boundary, which might seem weird at first, as we would expect to always want minimum response time. In this case, this evaluated elasticity boundary tells us that a too low response time means that the service has underused virtual machines, which is not cost effective. This conclusion can be reached by further investigating the elasticity boundaries for the rest of the service levels, which we do not expand here due to lack of space. Continuing with the scenario, knowing the boundaries for different service levels and monitored elements, the cloud service provider wants to extract service characteristics that indicate if the usual service behavior is within the determined space boundaries. Towards this we apply our elasticity pathway function prototype which groups combination of different metric values as DOMINANT, NON-DOMINANT and RARE, according to the rate at which they are encountered in the monitored data. Such a classification highlights the usual behavior of the service and the correlations between the analyzed metrics. Applying the pathway on the cost/client/h cloud service level metric (Fig. 7), from the encounter rates and the metric values, it is visible that the cost/client/h is less than $ only in approximate 76% of the encountered situations, leading to the conclusion that a pricing scheme of 2.5$ per month per client is not fully sustainable. To find out why, the provider uses the MELA multi-level analysis
8 feature to focus on the Event Processing Service Topology. The elasticity pathway is applied on the numberofclients/h, responsetime and throughput (operations) metrics, the metrics influencing the service performance, and thus, the number of served clients and the service cost efficiency. From the DOMINANT behavior (Fig. 8), it is visible that by summing up the encounter rates, in approximate 35% of the encountered situations, the service had less than the required 172 clients. Analyzing further, only in 8% of these situations we detect few clients with low throughput, while in the rest 27% we detect few clients but high response times and throughput, indicating a potential performance bottleneck. To determine the correct cause of the high cost per client, the cloud service provider needs to further investigate the elasticity space and pathways of the other monitored elements, from topology level information such as latency or cost for the Data Service Topology, to the service units, and low level performance (CPU usage, memory usage, latency) of associated VMs. The importance to monitor, analyze and characterize the service behavior at multiple levels was highlighted in this experiment, and the MELA features of multi-level metric composition and service behavior analysis where showcased on monitoring and determining the source of high service cost per client. VI. RELATED WORK In [3] the authors describe a framework for scalable realtime data collection and aggregation, [7] predicts performance anomalies by monitoring virtual machines, and in [8] the authors focus on monitoring and predicting cloud performance degradation due to bursting loads. Our tool differs from these approaches as it links service level to virtual infrastructure level monitoring data, providing a complete view over the monitored cloud service behavior. The authors of [9] improve existing monitoring systems using custom metric aggregation scripts and service model information, while we provide a customizable mechanism for mapping metrics to the service model and deriving higher level information. A mechanism for adapting cloud allocation is presented in [2], using an aggregator that monitors the workload at each service tier, while we employ a generic approach that can analyze a wide array of services. In [10] the authors monitor cloud resource usage for the infrastructure owner, while we adopt the cloud infrastructure user perspective. The authors of [5] present a comprehensive monitoring system collecting both virtual infrastructure and service level information, focusing on monitoring data delivery. Monitoring performance and data delivery is also the focus of [11], presenting a solution tailored for a specific virtualization framework. An elastic monitoring framework for cloud infrastructures is presented in [12], providing a powerful query mechanism for retrieving service level information. In our approach we also enrich monitoring data with derived metrics, and perform service behavior analysis towards extracting elasticity characteristics. In [4] the authors present an adaptive cloud monitoring system which provides estimations on monitoring accuracy, which could act as data source for our tool, as we focus on monitoring data structuring and analysis. VII. CONCLUSIONS AND FUTURE WORK To support the monitoring and analysis of elasticity of cloud services, this paper introduced elasticity space and elasticity pathway as novel concepts characterizing behavior of elastic cloud services. We have presented MELA which supports realtime multi-level analysis of elastic cloud services. MELA also provides several features for customizing and integrating different elasticity analysis functions to support the analysis of other complex elastic behaviors. For the future we will enhance our prototype by incorporating cloud infrastructure elasticity analysis with our elastic cloud service analysis. We will enhance MELA with pattern based elasticity space and pathway functions. Furthermore, we will work on automatic extraction of elasticity dimensions dependencies and automatic discovery of cloud service s elasticity space boundaries, as a means of learning about the service boundaries and behavior. REFERENCES [1] S. Dustdar, Y. Guo, B. Satzger, and H. L. Truong, Principles of elastic processes, IEEE Computing, no. 5, pp , [2] R. Singh, U. Sharma, E. Cecchet, and P. Shenoy, Autonomic mix-aware provisioning for non-stationary data center workloads, in International Conference on Autonomic Computing, ser. ICAC, 2010, pp [3] C. Wang, K. Schwan, V. Talwar, G. Eisenhauer, L. Hu, and M. Wolf, A flexible architecture integrating monitoring and analytics for managing large-scale data centers, in International Conference on Autonomic Computing, ser. ICAC, 2011, pp [4] S. Meng, A. K. Iyengar, I. Rouvellou, L. Liu, K. Lee, B. Palanisamy, and Y. Tang, Reliable state monitoring in cloud datacenters, in International Conference on Cloud Computing Technology and Science, ser. CLOUD. IEEE, 2012, pp [5] G. Katsaros, G. Kousiouris, S. V. Gogouvitis, D. Kyriazis, A. Menychtas, and T. Varvarigou, A self-adaptive hierarchical monitoring mechanism for clouds, Journal of Systems and Software, vol. 85, no. 5, pp , [Online]. Available: article/pii/s [6] D. J. Dean, H. Nguyen, and X. Gu, Ubl: unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems, in International Conference on Autonomic Computing, ser. ICAC. ACM, 2012, pp [7] Y. Tan, H. Nguyen, Z. Shen, X. Gu, C. Venkatramani, and D. Rajan, Prepare: Predictive performance anomaly prevention for virtualized cloud systems, in International Conference on Distributed Computing Systems, ser. ICDCS, 2012, pp [8] Q. Wang, Y. Kanemasa, M. Kawaba, and C. Pu, When average is not average: large response time fluctuations in n-tier systems, in International Conference on Autonomic Computing, ser. ICAC, 2012, pp [9] J. Shao, H. Wei, Q. Wang, and H. Mei, A runtime model based monitoring approach for cloud, in International Conference on Cloud Computing, ser. CLOUD, 2010, pp [10] M. Dhingra, J. Lakshmi, and S. K. Nandy, Resource usage monitoring in clouds, in International Conference on Grid Computing, ser. GRID. ACM/IEEE, 2012, pp [11] M. Kutare, G. Eisenhauer, C. Wang, K. Schwan, V. Talwar, and M. Wolf, Monalytics: online monitoring and analytics for managing large scale data centers, in Proceedings of the 7th international conference on Autonomic computing, ser. ICAC. ACM, 2010, pp [12] B. Konig, J. Alcaraz Calero, and J. Kirschnick, Elastic monitoring framework for cloud infrastructures, IET Communications, vol. 6, no. 10, pp , 2012.
Automatic, multi-grained elasticity-provisioning for the Cloud
Automatic, multi-grained elasticity-provisioning for the Cloud Cloud Monitoring Tool V1 Deliverable no.: 4.1 September 30 th, 2013 CELAR is funded by the European Commission DG-INFSO Seventh Framework
Topology Aware Analytics for Elastic Cloud Services
Topology Aware Analytics for Elastic Cloud Services [email protected] Master Thesis Presentation May 28 th 2015, Department of Computer Science, University of Cyprus In Brief.. a Tool providing Performance
Monitoring Elastic Cloud Services
Monitoring Elastic Cloud Services [email protected] Advanced School on Service Oriented Computing (SummerSoc 2014) 30 June 5 July, Hersonissos, Crete, Greece Presentation Outline Elasticity in Cloud
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
Principles and Methods for Elastic Computing
Principles and Methods for Elastic Computing CompArch Keynote - Lille, 1 July 2014 Schahram Dustdar Distributed Systems Group TU Vienna dsg.tuwien.ac.at Acknowledgements Includes some joint work with Hong-Linh
Towards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE
P ERFORMANCE M ONITORING AND A NALYSIS S ERVICES - S TABLE S OFTWARE WP3 Document Filename: Work package: Partner(s): Lead Partner: v1.0-.doc WP3 UIBK, CYFRONET, FIRST UIBK Document classification: PUBLIC
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Self-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
How To Manage Cloud Service Provisioning And Maintenance
Managing Cloud Service Provisioning and SLA Enforcement via Holistic Monitoring Techniques Vincent C. Emeakaroha Matrikelnr: 0027525 [email protected] Supervisor: Univ.-Prof. Dr. Schahram Dustdar
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure
Integration of the OCM-G Monitoring System into the MonALISA Infrastructure W lodzimierz Funika, Bartosz Jakubowski, and Jakub Jaroszewski Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059,
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 6 June, 2013 Page No. 1914-1919 IMPROVED PROXIMITY AWARE LOAD BALANCING FOR HETEROGENEOUS NODES Ms.
TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse
TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse Junfeng Zhao 1, 2, Bing Xie 1,2, Yasha Wang 1,2, Yongjun XU 3 1 Key Laboratory of High Confidence Software Technologies,
Principles of Software-defined Elastic Systems for Big Data Analytics
2014 IEEE International Conference on Cloud Engineering Principles of Software-defined Elastic Systems for Big Data Analytics Hong-Linh Truong, Schahram Dustdar Distributed Systems Group, Vienna University
Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 12902
Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR CLOUD ENVIRONMENT
AN EFFICIENT LOAD BALANCING ALGORITHM FOR CLOUD ENVIRONMENT V.Bharath 1, D. Vijayakumar 2, R. Sabarimuthukumar 3 1,2,3 Department of CSE PG, National Engineering College Kovilpatti, Tamilnadu, (India)
ASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
CloudCenter Full Lifecycle Management. An application-defined approach to deploying and managing applications in any datacenter or cloud environment
CloudCenter Full Lifecycle Management An application-defined approach to deploying and managing applications in any datacenter or cloud environment CloudCenter Full Lifecycle Management Page 2 Table of
Application of Predictive Analytics for Better Alignment of Business and IT
Application of Predictive Analytics for Better Alignment of Business and IT Boris Zibitsker, PhD [email protected] July 25, 2014 Big Data Summit - Riga, Latvia About the Presenter Boris Zibitsker
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS
SLA BASED SERVICE BROKERING IN INTERCLOUD ENVIRONMENTS Foued Jrad, Jie Tao and Achim Streit Steinbuch Centre for Computing, Karlsruhe Institute of Technology, Karlsruhe, Germany {foued.jrad, jie.tao, achim.streit}@kit.edu
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
MyDBaaS: A Framework for Database-as-a-Service Monitoring
MyDBaaS: A Framework for Database-as-a-Service Monitoring David A. Abreu 1, Flávio R. C. Sousa 1 José Antônio F. Macêdo 1, Francisco J. L. Magalhães 1 1 Department of Computer Science Federal University
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources
Probabilistic Model Checking at Runtime for the Provisioning of Cloud Resources Athanasios Naskos, Emmanouela Stachtiari, Panagiotis Katsaros, and Anastasios Gounaris Aristotle University of Thessaloniki,
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
Violin Symphony Abstract
Violin Symphony Abstract This white paper illustrates how Violin Symphony provides a simple, unified experience for managing multiple Violin Memory Arrays. Symphony facilitates scale-out deployment of
The Theory And Practice of Testing Software Applications For Cloud Computing. Mark Grechanik University of Illinois at Chicago
The Theory And Practice of Testing Software Applications For Cloud Computing Mark Grechanik University of Illinois at Chicago Cloud Computing Is Everywhere Global spending on public cloud services estimated
Cost Effective Automated Scaling of Web Applications for Multi Cloud Services
Cost Effective Automated Scaling of Web Applications for Multi Cloud Services SANTHOSH.A 1, D.VINOTHA 2, BOOPATHY.P 3 1,2,3 Computer Science and Engineering PRIST University India Abstract - Resource allocation
HP Virtualization Performance Viewer
HP Virtualization Performance Viewer Efficiently detect and troubleshoot performance issues in virtualized environments Jean-François Muller - Principal Technical Consultant - [email protected] HP Business
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES
USING VIRTUAL MACHINE REPLICATION FOR DYNAMIC CONFIGURATION OF MULTI-TIER INTERNET SERVICES Carlos Oliveira, Vinicius Petrucci, Orlando Loques Universidade Federal Fluminense Niterói, Brazil ABSTRACT In
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
BUNGEE An Elasticity Benchmark for Self-Adaptive IaaS Cloud Environments
BUNGEE An Elasticity Benchmark for Self-Adaptive IaaS Cloud Environments Andreas Weber, Nikolas Herbst, Henning Groenda, Samuel Kounev Munich - November 5th, 2015 Symposium on Software Performance 2015
Optimizing the Cost for Resource Subscription Policy in IaaS Cloud
Optimizing the Cost for Resource Subscription Policy in IaaS Cloud Ms.M.Uthaya Banu #1, Mr.K.Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional Centre
Holistic Performance Analysis of J2EE Applications
Holistic Performance Analysis of J2EE Applications By Madhu Tanikella In order to identify and resolve performance problems of enterprise Java Applications and reduce the time-to-market, performance analysis
Performance Management for Cloudbased STC 2012
Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
Cost Effective Selection of Data Center in Cloud Environment
Cost Effective Selection of Data Center in Cloud Environment Manoranjan Dash 1, Amitav Mahapatra 2 & Narayan Ranjan Chakraborty 3 1 Institute of Business & Computer Studies, Siksha O Anusandhan University,
Technical Investigation of Computational Resource Interdependencies
Technical Investigation of Computational Resource Interdependencies By Lars-Eric Windhab Table of Contents 1. Introduction and Motivation... 2 2. Problem to be solved... 2 3. Discussion of design choices...
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Pulsar Realtime Analytics At Scale. Tony Ng April 14, 2015
Pulsar Realtime Analytics At Scale Tony Ng April 14, 2015 Big Data Trends Bigger data volumes More data sources DBs, logs, behavioral & business event streams, sensors Faster analysis Next day to hours
Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control
Developing Scalable Smart Grid Infrastructure to Enable Secure Transmission System Control EP/K006487/1 UK PI: Prof Gareth Taylor (BU) China PI: Prof Yong-Hua Song (THU) Consortium UK Members: Brunel University
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
Energetic Resource Allocation Framework Using Virtualization in Cloud
Energetic Resource Allocation Framework Using Virtualization in Ms.K.Guna *1, Ms.P.Saranya M.E *2 1 (II M.E(CSE)) Student Department of Computer Science and Engineering, 2 Assistant Professor Department
International Journal of Computer & Organization Trends Volume21 Number1 June 2015 A Study on Load Balancing in Cloud Computing
A Study on Load Balancing in Cloud Computing * Parveen Kumar * Er.Mandeep Kaur Guru kashi University,Talwandi Sabo Guru kashi University,Talwandi Sabo Abstract: Load Balancing is a computer networking
Auto-Scaling Model for Cloud Computing System
Auto-Scaling Model for Cloud Computing System Che-Lun Hung 1*, Yu-Chen Hu 2 and Kuan-Ching Li 3 1 Dept. of Computer Science & Communication Engineering, Providence University 2 Dept. of Computer Science
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop
Role of Cloud Computing in Big Data Analytics Using MapReduce Component of Hadoop Kanchan A. Khedikar Department of Computer Science & Engineering Walchand Institute of Technoloy, Solapur, Maharashtra,
Portable Cloud Services Using TOSCA
Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University
Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
The allocation algorithm for data centers in cloud computing architecture from security perspective
The allocation algorithm for data centers in cloud computing architecture from security perspective *Chuan-Gang Liu 1,Hsin-Yi Lin, Kun-Ta Hsien Deparament of Information Technology, Chia Nan University
Affinity Aware VM Colocation Mechanism for Cloud
Affinity Aware VM Colocation Mechanism for Cloud Nilesh Pachorkar 1* and Rajesh Ingle 2 Received: 24-December-2014; Revised: 12-January-2015; Accepted: 12-January-2015 2014 ACCENTS Abstract The most of
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
Sentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications
Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae and Filip De Turck Ghent University, Faculty of
Characterizing Task Usage Shapes in Google s Compute Clusters
Characterizing Task Usage Shapes in Google s Compute Clusters Qi Zhang 1, Joseph L. Hellerstein 2, Raouf Boutaba 1 1 University of Waterloo, 2 Google Inc. Introduction Cloud computing is becoming a key
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
International Journal of Innovative Research in Computer and Communication Engineering
FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,
Load Balancing for Improved Quality of Service in the Cloud
Load Balancing for Improved Quality of Service in the Cloud AMAL ZAOUCH Mathématique informatique et traitement de l information Faculté des Sciences Ben M SIK CASABLANCA, MORROCO FAOUZIA BENABBOU Mathématique
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing
Heterogeneous Workload Consolidation for Efficient Management of Data Centers in Cloud Computing Deep Mann ME (Software Engineering) Computer Science and Engineering Department Thapar University Patiala-147004
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South
Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723
Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Authors: Sonia Fahmy, Department of Computer Science, Purdue University Address: 305 N. University St., West Lafayette,
An Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
Green Cloud Computing 班 級 : 資 管 碩 一 組 員 :710029011 黃 宗 緯 710029021 朱 雅 甜
Green Cloud Computing 班 級 : 資 管 碩 一 組 員 :710029011 黃 宗 緯 710029021 朱 雅 甜 Outline Introduction Proposed Schemes VM configuration VM Live Migration Comparison 2 Introduction (1/2) In 2006, the power consumption
Intel Service Assurance Administrator. Product Overview
Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an
Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008.
Case Study - I Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008 Challenges The scalability of the database servers to execute batch processes under
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT
International Journal of Advanced Technology in Engineering and Science www.ijates.com DESIGN OF AGENT BASED SYSTEM FOR MONITORING AND CONTROLLING SLA IN CLOUD ENVIRONMENT Sarwan Singh 1, Manish Arora
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
Design and Implementation of IaaS platform based on tool migration Wei Ding
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory
