Provenance Framework for the Cloud Environment (IaaS)
|
|
|
- Clarissa Reed
- 10 years ago
- Views:
Transcription
1 Framework for the Environment (IaaS) Muhammad Imran Research Group Entertainment Computing University of Vienna, Austria Helmut Hlavacs Research Group Entertainment Computing University of Vienna, Austria Abstract providers can optimize resource utilization and energy consumption by finding patterns in their usage. One way of finding such patterns is to study the history of resources activity. This approach is known as provenance. can also be used to track errors and faults in services. We have developed a provenance framework for research s in order to find the history of the resources usage. Our framework collects provenance data in response to the request of users for IaaS scheme. this paper, we discuss a provenance framework in the s and present different possible approaches of the provenance collection process. To the best of our knowledge, provenance is yet to be addressed in the environment. Hereby, we provide details of our proposed framework and present its performance evaluation. The experimental results show that our provenance framework has a very low overhead (less than milliseconds), which makes it ideal for the infrastructure. Keywords-provenance framework; cloud IaaS. I. INTRODUCTION The vision of is to address a complex engineering, medical or social problem. enables the end user to process huge amount of data and/or satisfy his needs for mass computational power via resource virtualization. The experiments are performed on on a large scale and shift of technology is already in progress [1], [2]. frastructure as a Service (IaaS) is the new paradigm for researchers to deploy complex applications into. This is different than Grid [3] and distributed environments where a user had to adopt their application to the grid infrastructure and policies. IaaS scheme provides a raw resource which is hired and updated according to the requirement of the application by a user without knowing the complexity and details of the underlying architecture. A resource is hired when a match is found based on a user and application requirements such as memory, disk space, resource type and/or provider. This is called on-demand computing and in the process of resource allocation, a user is charged with some price. Once a resource is updated and used, the user may take a snapshot of the resource if the same resource is to be used later on. Workflow [4] is designed to execute activities in order for a complex application in e-science. of a workflow activities [5] is the information about intermediate data and processes to verify the execution of an application. in general means; the origin or source of an object. s, provenance can be broadly categorized into user data (applications installed on a virtual machine), instance type (memory, disk size, number of instances) and resource type (image ID, location). Such information is of high importance to utilize the cloud resources, e.g., a resource already built and updated by one user can be used by others with minimum or no change of the installed applications and components. Furthermore, mining provenance data can be used to forecast a future request, e.g., Eddy Caron [6] used string matching algorithm on recent history data to forecast a next request. Similarly, networks in general and s in particular are prone to errors, and the history data can be utilized in s to resolve the errors with minimum effort. s are still in the process of evolution and provenance is yet to be implemented (addressed) in s. Contributions of this paper are the following: A brief overview of research s IaaS and a detailed discussion of possible schemes to incorporate provenance into environment. A use case of provenance usage and example metadata from IaaS. Detailed architecture of our provenance framework for IaaS and the evaluation of collecting and storing provenance data. The rest of the paper is organized as follows. Section II summarizes the research architecture and discusses the possible provenance schemes. Section III gives the details of the underlying architecture (middleware) used by the research s and the extension of this architecture to collect provenance data. Section IV gives a brief overview to use the provenance data and utilize resources. Section V, we present the test results of the collection and storage module. Section VI concludes our work and presents the directions for the future implementations. II. RESEARCH CLOUD IAAS ARCHITECTURE AND DISCUSSION OF PROVENANCE SCHEMES A. Research IaaS computing is generally categorized into three types which are business, Research or private and hybrid s.
2 Application services User Uses Tools ( API) Controller API API Controller Cluster API Cluster Controller Node API Node Cotroller Manages User applicatoin Services service Service store Service 1 Service 2 Virtual Machine Figure 2. Service 3 Service as Part of Services. Figure 1. Generalized Architecture. They are further subdivided into three schemes which are frastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). Three different s, i.e., EUCALYPTUS [7], Nimbus [8] and OpenNebula [9] were explored to understand their internal architecture and communication mechanism between various components. This helped us to discuss the possible provenance schemes for IaaS and implication of our proposed framework. The main components of IaaS are summarized below: Application tools: Application Programming terface (API) available to communicate with services, e.g., resource hiring, starting, stopping, saving and/or describing the state of a particular resource., Cluster and Node: The request of users is handled by the and routed to Clusters and Nodes respectively. The Node communicates with Virtual Machine (VM) and the job of Cluster is to manage different nodes in the network. : offers storage unit (file system) to save user data and raw disk images to be run as resources. Communication with a storage unit is controlled by a service, e.g., Walrus in Eucalyptus and a user can save the updated state of a running machine. The process of saving the updated machine into is called snapshot. Figure 1 presents a generalized architectural overview and control flow from user to VM in IaaS. B. as a Part of Services this scheme, the provider needs to provide a service which will communicate with other services including cluster, node and storage to collect provenance data. This scheme proposes the application of provenance as a part of overall frastructure. The following list the advantages of provenance inside the IaaS. Easy to use as provenance is already a part of infrastructure and a user can decide to turn it on/off just like other services. Users will prefer this scheme as they do not need to understand the structure of provenance framework and is the responsibility of the provider to embed such a framework. The following lists the disadvantages of such a provenance scheme. providers cannot charge users for such a scheme unless it has some benefits of resource utilization and initialization for users. case of services failure, provenance system will also fail and there is no way to trace the reason for the failure. There will be extra burden on the provider because the usage of resources must increase due to incorporating the provenance system as a part of framework. Such scheme can only work with a particular version of IaaS. Any change in model or services signature needs an appropriate change in provenance application. distributed, grid and workflow computing, there are many examples of provenance data management and schemes [10] [13]. Each of these schemes is designed for a particular environment and they rely on the underlying services model. Therefore, the existing techniques cannot be applied to environment and further, services are not extensible to third party applications. Figure 2 presents a provenance system as a part of services. C. is dependent of Services A provenance scheme which adopts a modular and an agent like approach to address cross platform, applications and different providers is independent of infrastructure. Such a scheme must address on-demand, pay as you go and extremely flexible architecture. Advantages of an independent provenance scheme are: dependent of services and various applications domain. Failure of will not affect provenance scheme as it is not a part of.
3 User service applicatoin store Figure 3. collection Services cloud store Service Application services as an dependent Module Service 1 Service 2 Service 3 The users and providers will be able to track faults and errors if some services failed to work properly. Usability and simplicity of such a scheme is very high because the user has complete control of the provenance system. Disadvantages of such a scheme are as follows: Complete understanding of services is required to make any changes and communicate with the infrastructure. Trust is required on behalf of the provider because of request, permission and response from the services to the provenance module. Any change in services, their signature, or communication mechanism will need an appropriate change in provenance scheme. workflow computing, Karma [14] is using a notification broker where all the activities are published to and stored in a provenance store. The technique proposed by the Karma service is not part of a workflow enactment engine and it works as a bridge between the provenance store and the enactment engine. Figure 3 gives a brief overview of an independent provenance scheme in. D. Discussion Both of these approaches have their pros and cons. While considering provenance for IaaS, the major challenge is to address the extensibility. s are not extensible by nature and in case of open s, a developer needs a deep understanding of the source code in order to make any changes. Keeping this point in view, we propose a provenance framework which is independent of IaaS provider and with minimal or no changes required in services. III. PROVENANCE FRAMEWORK Research s rely on the open source technologies to provide an infrastructure (IaaS). These open source technologies includes JAVA and C/C++ languages, and Apache, Axis and Mule [15] communication frameworks. A general consensus is that would not be possible without these open source technologies. Research, e.g., Eucalyptus use Apache, Axis2/C and Mule engines to deploy services as IaaS and built a communication mechanism between different components. Apache is widely used for its speed, lightweight engine and its support of SOAP, WSDL and REST interfaces. Similarly, Mule is an integration platform used to connect various applications and/or services. These technologies are used to connect various components and are called middleware. This middleware is extensible and a developer can add custom methods to the already deployed applications and service. The proposed framework is based on this feature of extensibility from Apache, Mule and other third party tools and consists of the following components: Collection, Parsing,, Query and Visualization. First, the explanation of Apache architecture and its extension for the development of the provenance framework is given. A. Apache (Axis2/C) To develop a provenance framework, the following components of the Apache architecture are utilized. Handler: or interceptor is the smallest execution unit in the message passing system of the Apache Engine. The idea is to intercept the flow of a message and perform the additional task submitted by a user. Handler can read and write to the message context (apache messaging system). A handler has two parts: header and body. The header specifies the name and body the operation. There are predefined handlers in the Apache Axis execution chain and also the ability to provide custom handlers developed by the developers [16]. A group of handlers that is orchestrated and deployed within the Apache engine is called a module. Phase: is the concept in Apache Axis to support the dynamic ordering of the handlers. It acts like a bucket in which where the handler is put. A phase can have one or more handlers. Apache provides different kinds of phases spanning from global (for overall axis communication) to operational (for a particular operation or web method). Flow: is a collection of phases. Phase is more like a logical collection where flow is a real execution chain. There are four types of flows in Apache engine. Flow Flow FaultFlow FaultFlow Similarly, other third party libraries and frameworks used by s are also extensible. Examples of such frameworks are the use of Mule in Eucalyptus, Axis in Nimbus and Apache xml-rpc in OpenNebula. The basic architecture of these libraries is different but the main idea of an interceptor or handler is the same. For example, in Mule, the message context is referred to as Mule. terceptors can be deployed before and after a component is invoked in the
4 Mule framework. The Mule message before and after resides in flows which are called inbound-router and outboundrouter respectively. B. Collection When a message enters Apache engine, it goes through Flow and invokes all the handlers inside. FaultFlow is similar and handles a faulty incoming request, e.g., sending wrong arguments to the web service method or any other unexpected condition that prevents the request to succeed. Flow is invoked when a message is moving out of Apache engine (invoking all handlers in Flow) and the FaultFlow is invoked when something goes wrong in the out path, e.g., a host is shut down unexpectedly. Various Flows within Apache engine and the execution of a service with input and output messages is described in figure 4. The left side of figure details the different flows and the right side gives an overview of one single flow with phases and handlers concepts (both built in and user defined). Custom handlers, using C/C++ for provenance collection are deployed in four different Flows of the Apache execution chain. When a component inside IaaS is invoked, provenance collection module intercepts the flow, collects and parses the message for provenance data in the corresponding execution flow. C. Parsing and Storing into XML File SOAP message inside Apache engine is intercepted by the collector module which passes this message to the parser. The parser reads the SOAP message, parse it accordingly and store the data in a well defined XML file. We used XML schema for the collected provenance data because it is widely used model for data representation. The XML can be used to maximize the advantages of custom algorithms and third party applications. To query the provenance data, it is better to provide a standard schema and hence the usage according to individual preferences. TableI presents a sample of collected, parsed and stored provenance data by our provenance framework. This data represent user activity for methods of Eucalyptus cluster service and detail the timestamps, resource type and instance specific information. <UserData> is the list of applications specified by user to populate the resource and <TimeStamp> are corresponding start and finish time for a web service method. D. Query Custom applications can query provenance data based on the user requirements. We find the activity pattern in IaaS based on a resource type, instance type, time used or user ID in our example query. This information can be used to monitor IaaS and the frequently used resources can be moved to a faster CPU/disk unit for better performance. Algorithm 1 is used to find activity patterns based on the the resource-id. Algorithm 1 Solve Query Q: Q = Return Resource Types (emi-ids) in XML Store Require: XMLStore, ClusterName Ensure: XMLStore is not Empty Begin Array ResouceType[] T OpenXMLFile(XMLStoreLocation) FindCluster(ClusterName) while ParentNode<MethodName> == Runstance) do T ChildNode(<ImageID>) end while End Figure 5. E. User terface User terface for Engaging Module into Usability of the proposed provenance framework is very high. providers can enable/disable the provenance module according to their choice. Different options are available to enable/disable the provenance module based on the requirements of the provider. Some of the options are: to enable/disable provenance module for all clusters, a particular cluster, all nodes, a particular node, or selected methods from a particular cluster or node. Figure 5 presents a prototype of user interface available to IaaS provider. F. Framework Experience By extending the middleware (Apache and Mule) using handlers, we are independent of provider and different IaaS schemes. We followed a modular approach and divided
5 Web Service Execution Flow Axis2C engine Flow FaultFlow Flow FaultFlow P1 P2 P3 P4 H1 Hu Hn Pi=phase Hi=handler Hu=custom handler Flow with custom handler Figure 4. Apache Axis2C Architecture <EucalyptusServiceName> ClusterController</EucalyptusServiceName> <TimeStamp> Start and End Time of Method</TimeStamp> <MethodName>StartNetwork</MethodName> <ClusterAddress> </ClusterAddress> <UserID>admin</UserID> <ImageID>emi-392B15F8</ImageID> <KernelID>eki-AE1D17D7</KernelID> <RamdiskID>eri </RamdiskID> <MethodName>Runstance</MethodName> <ImageURL>emi-URL</ImageURL> <RamDiskURL>eri-URL</RamDiskURL> <KernelURL>eki-URL</KernelURL> <TimeStamp> Start and End Time of Method</TimeStamp> <MethodName>StopNetwork</MethodName> <UserID>admin</UserID> Table I SAMPLE METADATA FOR CLOUD IAAS stance Type <Name>m1.small</Name> <Memory>512</Memory> <Cores>1</Cores> <Disk>6</Disk> <UserData>DataFile</UserData> our framework into different components. The future of provenance in lies in a lightweight and independent provenance scheme to address cross platform, s IaaS and application domains. The proposed framework can be deployed without making any changes to the services or architecture. Advantages of the scheme are: It is independent of services and platform and it works with any IaaS which use the Apache, Mule or similar frameworks. The proposed framework follows a soft deployment approach and therefore, no installation is required. Some of the challenges offered by infrastructure are virtualization, on demand computing, pay as you go model, more abstract, extremely flexible and the services are not extensible by nature. The proposed framework address these challenges in automatic fashion as being part of middleware. Major Disadvantage of proposed framework is: Rely completely on the extension of the middleware and cannot work on any other IaaS where middleware is not extensible. IV. CLOUD PROVENANCE: A USE CASE FOR EFFICIENT RESOURCE INITIALIZATION AND ENERGY CONSUMPTION Description: Resource utilization is critically important both from the resource provider and performance perspective. the resource allocation process, a user may request a resource with the input file of required applications that is the same as a previously initialized resource but will still need to build the resource from scratch. The resource utilization can be maximized if one is able to provide automatic discovery of already running instances, saved volumes and snapshots. The automatic discovery will not only help in resource utilization but will also provide means to reduce the time and energy consumed. Our proposed framework collects the metadata information regarding time, user, cluster and location of newly created volumes or snapshots and stores it in a provenance database. To make the process of resource allocation efficient and automatic, the broker (which takes input from user) compares the user input file with existing provenance data. If the comparison of input file results in an exact match then instead of starting a new resource from scratch, the existing resource volume and snapshot are deployed. Actors: End-user and provider. A user benefits from
6 Table II UNDERLYING ARCHITECTURAL COMPONENTS provider Operating system services engine Languages unit Virtualization Service tested Eucalyptus Linux Ubuntu Server Axis2/C C,C++ File system (XML) KVM/XEN Cluster controller Resource assigned Figure 6. Start new resource Start resource Request for resource Resource broker Query provenance for pattern Match not found Start resource data Match found itialize existing resource Resource itialization Using this scheme by saving his time and effort to build a resource from scratch. On the other hand, the provider utilizes existing deployed resources and saves energy. Advantages: Faster resource initialization in case a match is found. Utilization of existing deployed resource (volumes, snapshots) to save energy, cost and time. Overall performance will increase. Figure 6 describes the process of using provenance data and making s more efficient and proactive. V. EVALUATION Different approaches are proposed in literature for collecting and storing provenance data to reduce the computation and storage overhead [17]. Mainly, there are two methods. The first method proposes to collect provenance data and store a copy of the parent object. The disadvantage of this method is a huge storage overheard. The second method proposes to store links of the parent object. This method is faster and storage overhead is very low. Disadvantage of this method is consistency in case a parent object is deleted or moved. To store provenance data we followed the second approach and the proposed framework stores only the link information about the activity of users and components. The provenance data consists of information like: images, snapshots, volumes, instance types and user data etc. Real data is already stored in the storage unit and we do not make a copy of this data. Since links are lightweight, therefore computation and storage overhead for the provenance data is negligible. We evaluated the cluster controller service and results were surprising for collection and storage module. To get physical evidence, timestamps were calculated at the beginning of provenance module invocation and later on when the data is parsed and saved into XML file. Time overhead including the provenance module for flow and flow phases of Apache were less than milliseconds. To find the storage overhead we calculated file size of provenance data for individual methods. We chose a worst case scenario where all the incoming and outgoing data was stored. This process was performed for every method in Eucalyptus cluster service and the average file size of stored provenance data is about 5 KB for each method. Evaluation was performed by using the underlying architecture detailed in table II. Physical machine details for running IaaS are the following: Number of PCs: 2 (PC1 with, Cluster and Service, PC2 with Node service), Processor: tel Core (TM) 2: CPU 2.13 GHz, Memory: 2GB, Disk Space: 250 GB It is essential to note that the low computation and storage overhead of the provenance frameworks is because of two reasons. First, we used an approach where the extension of the middleware is achieved by built in features. This approach does not add any extra burden except the collection of provenance data. Second, we store the provenance data by using a link based approach. This approach saves on duplicating the storage of huge amounts which already exists in database. VI. CONCLUSION AND FUTURE WORK With the evolution of technology and IaaS, complex applications are target environment for s. s offers on demand computing and pay as you go model, where applications discover resources at run time. The focus of this paper is provenance data for IaaS scheme. A client application hires resources from IaaS and populates them according to the requirements. These populated resources are saved in storage unit and can be used by other applications having the same requirements. This process requires storage of users or application activity. First, we discussed general approaches to collect activity information performed on IaaS with their pros and cons. By using those approaches as the basis of our study, we developed a framework which is not dependent on services or underlying architecture. We divided our framework into different components and proposed a use case scenario where the collected provenance data can be used to utilize resources and to save cost, energy and time. Collecting and
7 storage overhead of the proposed framework is very low. the future we will extend the framework for resource utilization in order to save cost, time and energy using provenance. REFERENCES [1] C. N. Hoefer and G. Karagiannis, Taxonomy of cloud computing services, in Proceedings of the 4th IEEE Workshop on Enabling the Future Service-Oriented ternet (EFSOI 10), Workshop of IEEE GLOBECOM 2010, Miami, USA, ser IEEE GLOBECOM Workshops. USA: IEEE Communications Society, December 2010, pp [2] C. Hoffa, G. Mehta, T. Freeman, E. Deelman, K. Keahey, B. Berriman, and J. Good, On the use of cloud computing for scientific workflows, in Proceedings of the 2008 Fourth IEEE ternational Conference on escience, ser. ESCIENCE 08. Washington, DC, USA: IEEE Computer Society, 2008, pp [3] I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the grid: Enabling scalable virtual organizations, t. J. High Perform. Comput. Appl., vol. 15, no. 3, pp , Aug [13] Y. L. Simmhan, B. Plale, and D. Gannon, A Survey of Data Techniques, Computer Science Department, diana University, Bloomington IN, Tech. Rep., [14] Y. L. Simmhan, B. Plale, D. Gannon, and S. Marru, Performance evaluation of the karma provenance framework for scientific workflows, in in: ternational and Annotation Workshop (IPAW). Springer, 2006, pp [15] Mule esb. [retrieved: may, 2012]. [Online]. Available: [16] A. S. Foundation, Apache axis2/java - next generation web services, Website Jul [17] D. Koop, E. Santos, B. Bauer, M. Troyer, J. Freire, and C. T. Silva, Bridging workflow and data provenance using strong links, in Proceedings of the 22nd international conference on Scientific and statistical database management, ser. SS- DBM 10. Berlin, Heidelberg: Springer-Verlag, 2010, pp [4] I. J. Taylor, E. Deelman, D. B. Gannon, and M. Shields, Workflows for e-science: Scientific Workflows for Grids. Secaucus, NJ, USA: Springer-Verlag New York, c., [5] R. S. Barga, Y. L. Simmhan, E. Chinthaka, S. S. Sahoo, J. Jackson, and N. Araujo, for scientific workflows towards reproducible research. IEEE Data Eng. Bull., vol. 33, no. 3, pp , [6] E. Caron, F. Desprez, and A. Muresan, Forecasting for grid and cloud computing on-demand resources based on pattern matching, in Proceedings of the 2010 IEEE Second ternational Conference on Computing Technology and Science, ser. CLOUDCOM 10. Washington, DC, USA: IEEE Computer Society, 2010, pp [7] Eucalyptus. [retrieved: may, 2012]. [Online]. Available: [8] Nimbus. [retrieved: may, 2012]. [Online]. Available: [9] Opennebula. [retrieved: may, 2012]. [Online]. Available: [10] M. Szomszor and L. Moreau, Recording and reasoning over data provenance in web and grid services. ser. Lecture Notes in Computer Science, R. Meersman, Z. Tari, and D. C. Schmidt, Eds., vol Springer, 2003, pp [11] Y. Cui and J. Widom, Lineage tracing for general data warehouse transformations, in Proceedings of the 27th ternational Conference on Very Large Data Bases, ser. VLDB 01. San Francisco, CA, USA: Morgan Kaufmann Publishers c., 2001, pp [12] P. Buneman, S. Khanna, and W. chiew Tan, Why and where: A characterization of data provenance, in ICDT 01: Proceedings of the 8th ternational Conference on Database Theory. Springer, 2001, pp
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Efficient Cloud Management for Parallel Data Processing In Private Cloud
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Efficient Cloud Management for Parallel Data Processing In Private
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
Cloud-pilot.doc 12-12-2010 SA1 Marcus Hardt, Marcin Plociennik, Ahmad Hammad, Bartek Palak E U F O R I A
Identifier: Date: Activity: Authors: Status: Link: Cloud-pilot.doc 12-12-2010 SA1 Marcus Hardt, Marcin Plociennik, Ahmad Hammad, Bartek Palak E U F O R I A J O I N T A C T I O N ( S A 1, J R A 3 ) F I
Scientific versus Business Workflows
2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA (fulvio.valenza@polito.
+ FREE AND OPEN SOURCE SOFTWARE FOR CLOUD COMPUTING SERENA SPINOSO ([email protected]) FULVIO VALENZA ([email protected]) + OUTLINE INTRODUCTION OF CLOUD DEFINITION OF CLOUD BASIC CLOUD COMPONENTS
Deploying Business Virtual Appliances on Open Source Cloud Computing
International Journal of Computer Science and Telecommunications [Volume 3, Issue 4, April 2012] 26 ISSN 2047-3338 Deploying Business Virtual Appliances on Open Source Cloud Computing Tran Van Lang 1 and
VIRTUAL RESOURCE MANAGEMENT FOR DATA INTENSIVE APPLICATIONS IN CLOUD INFRASTRUCTURES
U.P.B. Sci. Bull., Series C, Vol. 76, Iss. 2, 2014 ISSN 2286-3540 VIRTUAL RESOURCE MANAGEMENT FOR DATA INTENSIVE APPLICATIONS IN CLOUD INFRASTRUCTURES Elena Apostol 1, Valentin Cristea 2 Cloud computing
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform
An Experimental Study of Load Balancing of OpenNebula Open-Source Cloud Computing Platform A B M Moniruzzaman 1, Kawser Wazed Nafi 2, Prof. Syed Akhter Hossain 1 and Prof. M. M. A. Hashem 1 Department
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
Workload Characterization and Analysis of Storage and Bandwidth Needs of LEAD Workspace
Workload Characterization and Analysis of Storage and Bandwidth Needs of LEAD Workspace Beth Plale Indiana University [email protected] LEAD TR 001, V3.0 V3.0 dated January 24, 2007 V2.0 dated August
A STUDY ON OPEN SOURCE CLOUD COMPUTING PLATFORMS
31 A STUDY ON OPEN SOURCE CLOUD COMPUTING PLATFORMS ABSTRACT PROF. ANITA S. PILLAI*; PROF. L.S. SWASTHIMATHI** *Faculty, Prin. L. N. Welingkar Institute of Management Development & Research, Bengaluru,
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
Classic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
Cloud Computing Simulation Using CloudSim
Cloud Computing Simulation Using CloudSim Ranjan Kumar #1, G.Sahoo *2 # Assistant Professor, Computer Science & Engineering, Ranchi University, India Professor & Head, Information Technology, Birla Institute
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
Web Service Based Data Management for Grid Applications
Web Service Based Data Management for Grid Applications T. Boehm Zuse-Institute Berlin (ZIB), Berlin, Germany Abstract Web Services play an important role in providing an interface between end user applications
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
OpenNebula An Innovative Open Source Toolkit for Building Cloud Solutions
Cloud Computing and its Applications 20th October 2009 OpenNebula An Innovative Open Source Toolkit for Building Cloud Solutions Distributed Systems Architecture Research Group Universidad Complutense
A Case Based Tool for Monitoring of Web Services Behaviors
COPYRIGHT 2010 JCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 01, ISSUE 01, MANUSCRIPT CODE: 100714 A Case Based Tool for Monitoring of Web Services Behaviors Sazedul Alam Abstract Monitoring
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Efficient database auditing
Topicus Fincare Efficient database auditing And entity reversion Dennis Windhouwer Supervised by: Pim van den Broek, Jasper Laagland and Johan te Winkel 9 April 2014 SUMMARY Topicus wants their current
Cloud Infrastructure Pattern
1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP 2012), July 23-27, 2012, Panama City, Panama. Cloud Infrastructure Pattern Keiko Hashizume Florida Atlantic
rpafi/jl open source Apache Axis2 Web Services 2nd Edition using Apache Axis2 Deepal Jayasinghe Create secure, reliable, and easy-to-use web services
Apache Axis2 Web Services 2nd Edition Create secure, reliable, and easy-to-use web services using Apache Axis2 Deepal Jayasinghe Afkham Azeez v.? w rpafi/jl open source I I I I community experience distilled
Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire [email protected] 25th
irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire [email protected] Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...
Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications
Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim Abstract In Hadoop MapReduce distributed file system, as the input
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil
Multilingual Interface for Grid Market Directory Services: An Experience with Supporting Tamil S.Thamarai Selvi *, Rajkumar Buyya **, M.R. Rajagopalan #, K.Vijayakumar *, G.N.Deepak * * Department of Information
High Availability of the Polarion Server
Polarion Software CONCEPT High Availability of the Polarion Server Installing Polarion in a high availability environment Europe, Middle-East, Africa: Polarion Software GmbH Hedelfinger Straße 60 70327
CLEVER: a CLoud-Enabled Virtual EnviRonment
CLEVER: a CLoud-Enabled Virtual EnviRonment Francesco Tusa Maurizio Paone Massimo Villari Antonio Puliafito {ftusa,mpaone,mvillari,apuliafito}@unime.it Università degli Studi di Messina, Dipartimento di
Final Project Proposal. CSCI.6500 Distributed Computing over the Internet
Final Project Proposal CSCI.6500 Distributed Computing over the Internet Qingling Wang 660795696 1. Purpose Implement an application layer on Hybrid Grid Cloud Infrastructure to automatically or at least
TECHNOLOGY GUIDE THREE. Emerging Types of Enterprise Computing
TECHNOLOGY GUIDE THREE Emerging Types of Enterprise Computing TECHNOLOGY GU IDE OUTLINE TG3.1 Introduction TG3.2 Server Farms TG3.3 Virtualization TG3.4 Grid Computing TG3.5 Utility Computing TG3.6 Cloud
Six Strategies for Building High Performance SOA Applications
Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture
CA Automation Suite for Data Centers
PRODUCT SHEET CA Automation Suite for Data Centers agility made possible Technology has outpaced the ability to manage it manually in every large enterprise and many smaller ones. Failure to build and
Key Research Challenges in Cloud Computing
3rd EU-Japan Symposium on Future Internet and New Generation Networks Tampere, Finland October 20th, 2010 Key Research Challenges in Cloud Computing Ignacio M. Llorente Head of DSA Research Group Universidad
A Service for Data-Intensive Computations on Virtual Clusters
A Service for Data-Intensive Computations on Virtual Clusters Executing Preservation Strategies at Scale Rainer Schmidt, Christian Sadilek, and Ross King [email protected] Planets Project Permanent
Amazon Web Services. Elastic Compute Cloud (EC2) and more...
Amazon Web Services Elastic Compute Cloud (EC2) and more... I don t work for Amazon I do however, have a small research grant from Amazon (in AWS$) Portions of this presentation are reproduced from slides
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
GENERIC DATA ACCESS AND INTEGRATION SERVICE FOR DISTRIBUTED COMPUTING ENVIRONMENT
GENERIC DATA ACCESS AND INTEGRATION SERVICE FOR DISTRIBUTED COMPUTING ENVIRONMENT Hemant Mehta 1, Priyesh Kanungo 2 and Manohar Chandwani 3 1 School of Computer Science, Devi Ahilya University, Indore,
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
Cloud computing - Architecting in the cloud
Cloud computing - Architecting in the cloud [email protected] 1 Outline Cloud computing What is? Levels of cloud computing: IaaS, PaaS, SaaS Moving to the cloud? Architecting in the cloud Best practices
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
CDBMS Physical Layer issue: Load Balancing
CDBMS Physical Layer issue: Load Balancing Shweta Mongia CSE, School of Engineering G D Goenka University, Sohna [email protected] Shipra Kataria CSE, School of Engineering G D Goenka University,
CiteSeer x in the Cloud
Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar
ABSTRACT. KEYWORDS: Cloud Computing, Load Balancing, Scheduling Algorithms, FCFS, Group-Based Scheduling Algorithm
A REVIEW OF THE LOAD BALANCING TECHNIQUES AT CLOUD SERVER Kiran Bala, Sahil Vashist, Rajwinder Singh, Gagandeep Singh Department of Computer Science & Engineering, Chandigarh Engineering College, Landran(Pb),
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
AUTOMATIC PROXY GENERATION AND LOAD-BALANCING-BASED DYNAMIC CHOICE OF SERVICES
Computer Science 13 (3) 2012 http://dx.doi.org/10.7494/csci.2012.13.3.45 Jarosław Dąbrowski Sebastian Feduniak Bartosz Baliś Tomasz Bartyński Włodzimierz Funika AUTOMATIC PROXY GENERATION AND LOAD-BALANCING-BASED
EVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer
WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction
Successful Implementation of L3B: Low Level Load Balancer
Successful Implementation of L3B: Low Level Load Balancer Kiril Cvetkov, Sasko Ristov, Marjan Gusev University Ss Cyril and Methodius, FCSE, Rugjer Boshkovic 16, Skopje, Macedonia Email: kiril [email protected],
The OpenNebula Standard-based Open -source Toolkit to Build Cloud Infrastructures
Jornadas Técnicas de RedIRIS 2009 Santiago de Compostela 27th November 2009 The OpenNebula Standard-based Open -source Toolkit to Build Cloud Infrastructures Distributed Systems Architecture Research Group
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus
Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD
THE EUCALYPTUS OPEN-SOURCE PRIVATE CLOUD By Yohan Wadia ucalyptus is a Linux-based opensource software architecture that implements efficiencyenhancing private and hybrid clouds within an enterprise s
Pattern Insight Clone Detection
Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT
MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT 1 SARIKA K B, 2 S SUBASREE 1 Department of Computer Science, Nehru College of Engineering and Research Centre, Thrissur, Kerala 2 Professor and Head,
ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search
Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load
Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Enterprise Service Bus
We tested: Talend ESB 5.2.1 Enterprise Service Bus Dr. Götz Güttich Talend Enterprise Service Bus 5.2.1 is an open source, modular solution that allows enterprises to integrate existing or new applications
THE CCLRC DATA PORTAL
THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: [email protected], [email protected] Abstract: The project aims
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
Virtual Machine Instance Scheduling in IaaS Clouds
Virtual Machine Instance Scheduling in IaaS Clouds Naylor G. Bachiega, Henrique P. Martins, Roberta Spolon, Marcos A. Cavenaghi Departamento de Ciência da Computação UNESP - Univ Estadual Paulista Bauru,
DataNet Flexible Metadata Overlay over File Resources
1 DataNet Flexible Metadata Overlay over File Resources Daniel Harężlak 1, Marek Kasztelnik 1, Maciej Pawlik 1, Bartosz Wilk 1, Marian Bubak 1,2 1 ACC Cyfronet AGH, 2 AGH University of Science and Technology,
Log Mining Based on Hadoop s Map and Reduce Technique
Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, [email protected] Amruta Deshpande Department of Computer Science, [email protected]
Cloud Computing Overview
Cloud Computing Overview -A 60 minute overview on some essentials about Cloud systems -Target audience: Management, Architects Cloud Computing A cloud computing system stores data in a remotely accessible
Scheduler in Cloud Computing using Open Source Technologies
Scheduler in Cloud Computing using Open Source Technologies Darshan Upadhyay Prof. Chirag Patel Student of M.E.I.T Asst. Prof. Computer Department S. S. Engineering College, Bhavnagar L. D. College of
Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture
Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget
CompatibleOne Open Source Cloud Broker Architecture Overview
CompatibleOne Open Source Cloud Broker Architecture Overview WHITE PAPER October 2012 Table of Contents Abstract 2 Background 2 Disclaimer 2 Introduction 2 Section A: CompatibleOne: Open Standards and
Digital libraries of the future and the role of libraries
Digital libraries of the future and the role of libraries Donatella Castelli ISTI-CNR, Pisa, Italy Abstract Purpose: To introduce the digital libraries of the future, their enabling technologies and their
Effective Virtual Machine Scheduling in Cloud Computing
Effective Virtual Machine Scheduling in Cloud Computing Subhash. B. Malewar 1 and Prof-Deepak Kapgate 2 1,2 Department of C.S.E., GHRAET, Nagpur University, Nagpur, India [email protected] and [email protected]
Power Aware Load Balancing for Cloud Computing
, October 19-21, 211, San Francisco, USA Power Aware Load Balancing for Cloud Computing Jeffrey M. Galloway, Karl L. Smith, Susan S. Vrbsky Abstract With the increased use of local cloud computing architectures,
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
Towards an Architecture for Monitoring Private Cloud
Towards an Architecture for Monitoring Private Cloud Shirlei Aparecida de Chaves, Rafael Brundo Uriarte, Carlos Becker Westphall Federal University of Santa Catarina Networks and Management Laboratory
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
