SlideShare uma empresa Scribd logo
1 de 14
26 January 2013

Cloud Computing: principles and paradigms - Part III

1

10-COMETCLOUD: AN
AUTONOMIC CLOUD ENGINE
HYUNJOO KIM and MANISH PARASHAR
Cloud Computing
Principles and Paradigms
Presented by

Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

2

Outline
• Introduction
• Architecture overview
• Autonomic behavior of CometCloud

• Overview of CometCloud-based applications
• Implementation and Evaluation

• Future Research Directions
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

Introduction
• What
• Integrates of public and private cloud
• Is a PaaS
• Why
• to enable on-demand scale-up,
scale-down
and scale-out
• How
• Cloudbursting
• Cloudbridging
Presented by Majid Hajibaba

3
26 January 2013

Cloud Computing: principles and paradigms - Part III

Architecture

Presented by Majid Hajibaba

4
26 January 2013

Cloud Computing: principles and paradigms - Part III

Automatic Cloudbursting

Presented by Majid Hajibaba

5
26 January 2013

Cloud Computing: principles and paradigms - Part III

6

Motivations on Cloudbursting
• Load Dynamics
• The computational environment must dynamically grow (or shrink)
• In response to dynamic loads
• Accuracy of the Analytics
• The required accuracy of risk analytics
• To dynamically adapt to satisfy the accuracy requirements
• Collaboration of Different Groups
• Different groups run the same app. with different dataset policies
• To satisfy their SLA.
• Economics
• Application tasks can have very heterogeneous and dynamic priorities.
• To handle heterogeneous and dynamic prov. and sched. requirements.
• Failures
• To manage failures without impacting application QoS.
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

7

Automatic Cloudbridging

Deadline-Based

Policy

Budget-Based

Workload-Based

Cloud-Bridging

Virtually Integrated working cloud
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

Fault Tolerance

Presented by Majid Hajibaba

8
26 January 2013

Cloud Computing: principles and paradigms - Part III

9

CometCloud based apps
• VaR
• measuring the risk level of portfolios of financial instruments
• VaR calculation should be completed within the limited time
• computational requirements can change significantly
• autonomic cloudbursts
• Workload-based policy
• Image Registration
• determine the mapping between two images
• for medical informatics
• budget-based policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

10

Application Runtime on EC2

Communication Overhead

• All worker were unsecured
• Each worker ran on different instance

a: VaR

b: Image Registration

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

11

Automatic Cloudbursts Behaviors

a: Workload-specific policy

b: Workload-bounded policy

VaR using Workload-Based Policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

12

Automatic Cloudbursts Behaviors

Image Registration using Budget-Based Policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

13

With/Without Scheduling Agent

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

END
CometCloud: An Autonomic Cloud Engine
14

Mais conteúdo relacionado

Mais procurados

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Migrating into a cloud
Migrating into a cloudMigrating into a cloud
Migrating into a cloudANUSUYA T K
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2Ignacio M. Llorente
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Majid Hajibaba
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingJithin Parakka
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationPriyanka Sharma
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architectureMohammad Ilyas Malik
 
Chapter 10 Operating Systems silberschatz
Chapter 10 Operating Systems silberschatzChapter 10 Operating Systems silberschatz
Chapter 10 Operating Systems silberschatzGiulianoRanauro
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computingOneserve
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulatorHabibur Rahman
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Ravindra Dastikop
 

Mais procurados (20)

CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Migrating into a cloud
Migrating into a cloudMigrating into a cloud
Migrating into a cloud
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2An Introduction To Infarstructures For Cloud Computing V0.2
An Introduction To Infarstructures For Cloud Computing V0.2
 
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
Cloud Computing Principles and Paradigms: 5 virtual machines provisioning and...
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
basic concept of Cloud computing and its architecture
basic concept of Cloud computing  and its architecturebasic concept of Cloud computing  and its architecture
basic concept of Cloud computing and its architecture
 
Chapter 10 Operating Systems silberschatz
Chapter 10 Operating Systems silberschatzChapter 10 Operating Systems silberschatz
Chapter 10 Operating Systems silberschatz
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture
 

Semelhante a Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud engine

Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Majid Hajibaba
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud ComputingAsli Yazagan
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Majid Hajibaba
 
Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)GICTTraining
 
Linthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsLinthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsDavid Linthicum
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)GICTTraining
 
AWS Online Training Professional Guru
AWS Online Training Professional GuruAWS Online Training Professional Guru
AWS Online Training Professional GuruSelva Ganapathi
 
Cloud computing pmi-dvc-v3
Cloud computing pmi-dvc-v3Cloud computing pmi-dvc-v3
Cloud computing pmi-dvc-v3scm24
 
Melodic Keynote presentation at OW2con'19, June 12-13, Paris.
Melodic Keynote presentation at OW2con'19, June 12-13, Paris. Melodic Keynote presentation at OW2con'19, June 12-13, Paris.
Melodic Keynote presentation at OW2con'19, June 12-13, Paris. OW2
 
Cloud migration
Cloud migration Cloud migration
Cloud migration deszal
 
Google developer group 2021 - Introduction to cloud computing
Google developer group 2021 - Introduction to cloud computingGoogle developer group 2021 - Introduction to cloud computing
Google developer group 2021 - Introduction to cloud computingKalema Edgar
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutionMajid Hajibaba
 
ICC1_Module 1_Fundamentals of Cloud Computing.pptx
ICC1_Module 1_Fundamentals of Cloud Computing.pptxICC1_Module 1_Fundamentals of Cloud Computing.pptx
ICC1_Module 1_Fundamentals of Cloud Computing.pptxDeepakGour17
 
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud Speed
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud SpeedNO REQUIREMENTS: The Art Of Oracle Applications At Cloud Speed
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud SpeedCapgemini
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computingDivyesh Shah
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computingprabathsl
 

Semelhante a Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud engine (20)

Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
 
A view of Cloud Computing
A view of Cloud ComputingA view of Cloud Computing
A view of Cloud Computing
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
 
Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)Certified Cloud Computing Specialist (CCCS)
Certified Cloud Computing Specialist (CCCS)
 
Linthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platformsLinthicum state of-the-art-cloud-platforms
Linthicum state of-the-art-cloud-platforms
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)
 
Introduction to AWS
Introduction to AWSIntroduction to AWS
Introduction to AWS
 
AWS Online Training Professional Guru
AWS Online Training Professional GuruAWS Online Training Professional Guru
AWS Online Training Professional Guru
 
Cloud computing pmi-dvc-v3
Cloud computing pmi-dvc-v3Cloud computing pmi-dvc-v3
Cloud computing pmi-dvc-v3
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Melodic Keynote presentation at OW2con'19, June 12-13, Paris.
Melodic Keynote presentation at OW2con'19, June 12-13, Paris. Melodic Keynote presentation at OW2con'19, June 12-13, Paris.
Melodic Keynote presentation at OW2con'19, June 12-13, Paris.
 
Cloud computing managing
Cloud computing managingCloud computing managing
Cloud computing managing
 
Cloud migration
Cloud migration Cloud migration
Cloud migration
 
Google developer group 2021 - Introduction to cloud computing
Google developer group 2021 - Introduction to cloud computingGoogle developer group 2021 - Introduction to cloud computing
Google developer group 2021 - Introduction to cloud computing
 
cloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdutioncloud computing, Principle and Paradigms: 1 introdution
cloud computing, Principle and Paradigms: 1 introdution
 
ICC1_Module 1_Fundamentals of Cloud Computing.pptx
ICC1_Module 1_Fundamentals of Cloud Computing.pptxICC1_Module 1_Fundamentals of Cloud Computing.pptx
ICC1_Module 1_Fundamentals of Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud Speed
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud SpeedNO REQUIREMENTS: The Art Of Oracle Applications At Cloud Speed
NO REQUIREMENTS: The Art Of Oracle Applications At Cloud Speed
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computing
 

Mais de Majid Hajibaba

Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Majid Hajibaba
 
8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computingMajid Hajibaba
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Majid Hajibaba
 
Master Thesis presentation
Master Thesis presentationMaster Thesis presentation
Master Thesis presentationMajid Hajibaba
 

Mais de Majid Hajibaba (8)

Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)Storm (Distribute Stream Processing System)
Storm (Distribute Stream Processing System)
 
Kafka
KafkaKafka
Kafka
 
Apache Spark
Apache Spark Apache Spark
Apache Spark
 
8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing8 secure distributed data storage in cloud computing
8 secure distributed data storage in cloud computing
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
 
Master Thesis presentation
Master Thesis presentationMaster Thesis presentation
Master Thesis presentation
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud engine

  • 1. 26 January 2013 Cloud Computing: principles and paradigms - Part III 1 10-COMETCLOUD: AN AUTONOMIC CLOUD ENGINE HYUNJOO KIM and MANISH PARASHAR Cloud Computing Principles and Paradigms Presented by Majid Hajibaba
  • 2. 26 January 2013 Cloud Computing: principles and paradigms - Part III 2 Outline • Introduction • Architecture overview • Autonomic behavior of CometCloud • Overview of CometCloud-based applications • Implementation and Evaluation • Future Research Directions Presented by Majid Hajibaba
  • 3. 26 January 2013 Cloud Computing: principles and paradigms - Part III Introduction • What • Integrates of public and private cloud • Is a PaaS • Why • to enable on-demand scale-up, scale-down and scale-out • How • Cloudbursting • Cloudbridging Presented by Majid Hajibaba 3
  • 4. 26 January 2013 Cloud Computing: principles and paradigms - Part III Architecture Presented by Majid Hajibaba 4
  • 5. 26 January 2013 Cloud Computing: principles and paradigms - Part III Automatic Cloudbursting Presented by Majid Hajibaba 5
  • 6. 26 January 2013 Cloud Computing: principles and paradigms - Part III 6 Motivations on Cloudbursting • Load Dynamics • The computational environment must dynamically grow (or shrink) • In response to dynamic loads • Accuracy of the Analytics • The required accuracy of risk analytics • To dynamically adapt to satisfy the accuracy requirements • Collaboration of Different Groups • Different groups run the same app. with different dataset policies • To satisfy their SLA. • Economics • Application tasks can have very heterogeneous and dynamic priorities. • To handle heterogeneous and dynamic prov. and sched. requirements. • Failures • To manage failures without impacting application QoS. Presented by Majid Hajibaba
  • 7. 26 January 2013 Cloud Computing: principles and paradigms - Part III 7 Automatic Cloudbridging Deadline-Based Policy Budget-Based Workload-Based Cloud-Bridging Virtually Integrated working cloud Presented by Majid Hajibaba
  • 8. 26 January 2013 Cloud Computing: principles and paradigms - Part III Fault Tolerance Presented by Majid Hajibaba 8
  • 9. 26 January 2013 Cloud Computing: principles and paradigms - Part III 9 CometCloud based apps • VaR • measuring the risk level of portfolios of financial instruments • VaR calculation should be completed within the limited time • computational requirements can change significantly • autonomic cloudbursts • Workload-based policy • Image Registration • determine the mapping between two images • for medical informatics • budget-based policy Presented by Majid Hajibaba
  • 10. 26 January 2013 Cloud Computing: principles and paradigms - Part III 10 Application Runtime on EC2 Communication Overhead • All worker were unsecured • Each worker ran on different instance a: VaR b: Image Registration Presented by Majid Hajibaba
  • 11. 26 January 2013 Cloud Computing: principles and paradigms - Part III 11 Automatic Cloudbursts Behaviors a: Workload-specific policy b: Workload-bounded policy VaR using Workload-Based Policy Presented by Majid Hajibaba
  • 12. 26 January 2013 Cloud Computing: principles and paradigms - Part III 12 Automatic Cloudbursts Behaviors Image Registration using Budget-Based Policy Presented by Majid Hajibaba
  • 13. 26 January 2013 Cloud Computing: principles and paradigms - Part III 13 With/Without Scheduling Agent Presented by Majid Hajibaba
  • 14. 26 January 2013 Cloud Computing: principles and paradigms - Part III END CometCloud: An Autonomic Cloud Engine 14

Notas do Editor

  1. CometCloud is an autonomic computing engine (framework) for cloud and grid environments to realize a virtual computational cloud with resizable computing capability, which integrates local computational environments and public cloud services on-demand.Specifically, CometCloud enables policy-based autonomic cloudbridging and cloudbursting. Autonomic cloudbridging enables on-the-fly integration of local computational environments (data centers, grids) and public cloud services (such as Amazon EC2 [10] and Eucalyptus [20])autonomic cloudbursting enables dynamic application scale-out to address dynamic workloads, spikes in demands, and other extreme requirements
  2. CometCloud is based on a peer-to-peer substrate that can span enterprise data centers, grids, and clouds. Resources can be assimilated(جذب کردن، تلفیق کردن) on-demand and on-the-fly into its peer-to-peer overlay to provide services to applications. CometCloud is composed of a programming layer, a service layer, and an infrastructure layerInfrastecture Layer:The infrastructure layer uses the Chord self-organizing overlay, and the Squid information discovery and content-based routing substrate built on top of Chord.The routing engine supports flexible content-based routing and complex querying using partial keywords, wildcards, or ranges. It guarantees that all peer nodes with data elements that match a query/message will be located. Nodes have different roles and, accordingly, different access privileges based on their credentials and capabilities.This layer also provides replication and load balancing services, and it handles dynamic joins and leaves of nodes as well as node failures.Every node keeps the replica of its successor node’s state, and it reflects changes to that as well as notify predecessor.Service Layer:The service layer provides a range of services to supports autonomics at the programming and application level. This layer supports the Linda-like tuple space coordination model.Programming Layer:The programming layer provides the basic framework for application development and management. It supports a range of paradigms including the master/worker/BOT. Masters generate tasks and workers consume them. Scheduling and monitoring of tasks are supported by the application framework.The task consistency service handles lost tasks. Even though replication is provided by the infrastructure layer, a task may be lost due to network congestion. In this case, since there is no failure, infrastructure level replication may not be able to handle it. This can be handled by the master, for example, by waiting for the result of each task for a predefined time interval and, if it does not receive the result back, regenerating the lost task.
  3. The goal of autonomic cloudbursts is to seamlessly and securely integrate private enterprise clouds and data centers with public utility clouds on-demand,to provide the abstraction of resizable computing capacity.CometCloud considers three types of clouds based on perceived security/trust and assigns capabilities accordingly. The first is a highly trusted, robust, and secure cloud, usually composed of trusted/secure nodes within an enterprise, which is typically used to host masters and other key (management, scheduling, monitoring) roles.The second type of cloud is one composed of nodes with such credentials—that is, the cloud of secure workers.The final type of cloud consists of casual workers. These workers are not part of the space but can access the space through the proxy and a request handler to obtain (possibly encrypted) work units.If the space needs to be scale-up to store dynamically growing workload as well as requires more computing capability, then autonomic cloudbursts target secure worker to scale up. But only if more computing capability is required, then unsecured workers are added.
  4. Load Dynamics. Application workloads can vary significantly. This includes the number of application tasks as well the computational requirements of a task. The computational environment must dynamically grow (or shrink) in response to these dynamics while still maintaining strict deadlines.Accuracy of the Analytics. The required accuracy of risk analytics depends on a number of highly dynamic market parameters and has a direct impact on the computational demand—for example the number of scenarios in the Monte Carlo VaR formulation. The computational environment must be able to dynamically adapt to satisfy the accuracy requirements while still maintaining strict deadlines.Collaboration of Different Groups. Different groups can run the same application with different dataset policies . Here, policy means user’s SLA bounded by their condition such as time frame, budgets, and economic models. As collaboration groups join or leave the work, the computational environment must grow or shrink to satisfy their SLA.Economics. Application tasks can have very heterogeneous and dynamic priorities and must be assigned resources and scheduled accordingly. Budgets and economic models can be used to dynamically provision computational resources based on the priority and criticality of the application task. For example, application tasks can be assigned budgets and can be assigned resources based on this budget. The computational environment must be able to handle heterogeneous and dynamic provisioning and scheduling requirements.Failures. Due to the strict deadlines involved, failures can be disastrous. The computation must be able to manage failures without impacting application quality of service, including deadlines and accuracies.
  5. Autonomic cloudbridging is meant to connect CometCloud and a virtual cloud which consists of public cloud, data center, and grid by the dynamic needs ofthe application.Hence, types of used clouds, the number of nodes in each cloud, and resource types of nodes should be decided according to the changing environment of the clouds and application’s resource requirements.The scheduling agent manages autonomic cloudbridging and guarantees QoS within user policies. Autonomic cloudburst is represented by changing resource provisioning not to violate defined policy. We define three types of policies:Deadline-Based. When an application needs to be completed as soon as possible, assuming an adequate budget, the maximum required workers are allocated for the job.Budget-Based. When a budget is enforced on the application, the number of workers allocated must ensure that the budget is not violated.Workload-Based. When the application workload changes, the number of workers explicitly defined by the application is allocated or released.
  6. it support fault-tolerance in two ways which are in the infrastructure layer and in the programming layer. The replication substrate in the infrastructure layer provides a mechanism to keep the same state as that of its successor’s state, specifically coordination space and overlay information. Every node has a local space in the service layer and a replica space in the infrastructure layer. When a tuple is inserted or extracted from the local space, the node notifies this update to its predecessor and the predecessor updates the replica space. Hence every node keeps the same replica of its successor’s local space. When a node fails, another node in the overlay detects the failure and notifies it to the predecessor of the failed node. Then the predecessor of the failed node merges the replica space into the local space, and this makes all the tuples from the failed node recovered. Also the predecessor node makes a new replica for the local space of its new successor.To address packet loss, in programming layer the master checks the space periodically and regenerates lost tasks.
  7. VaR for measuring the risk level of a firm’s holdings and image registration for medical informatics. VaR calculation should be completed within the limited time, and the computational requirements for the calculation can change significantly.VaR we will focus on how autonomic cloudbursts work for dynamically changing workloads. Image registration is the process to determine the linear/nonlinear mapping T between two images of the same object or similar objects that are acquired at different time.that data size of image registration is much larger than that of VaR. For image registration, because it usually needs to be completed as soon as possible within budget limit, we will focus on how CometCloud works using budget-based policy.
  8. Total application runtime of CometCloud-based (a) VaR and (b) image registration on Amazon EC2.If the computed data size is large and it needs more time to be completed, then workers will have less access the proxy and the communication overhead of the proxy will decrease.
  9. When the application workload increases (or decreases), a predefined number of workers are added (or released), based on the application workload. we defined workload-specific and workload-bounded policies. In workload-specific, a user can specify the workload that nodes are allocated or released. In workload-bounded, whenever the workload increases by more than a specified threshold, a predefined number of workers is added. Similarly, if the workload decreases by more than the specified threshold, the predefined number of workers is released.
  10. we set the maximum number of available nodes to 25 for TW(private datacenter) and 100 for EC2.Costs for the TW data center included hardware investment, software, electricity, and so on.initially allocated 10 nodes each from TW and EC2.Total 500 tasks.