964 research outputs found

    VirtFogSim: A parallel toolbox for dynamic energy-delay performance testing and optimization of 5G Mobile-Fog-Cloud virtualized platforms

    Get PDF
    It is expected that the pervasive deployment of multi-tier 5G-supported Mobile-Fog-Cloudtechnological computing platforms will constitute an effective means to support the real-time execution of future Internet applications by resource- and energy-limited mobile devices. Increasing interest in this emerging networking-computing technology demands the optimization and performance evaluation of several parts of the underlying infrastructures. However, field trials are challenging due to their operational costs, and in every case, the obtained results could be difficult to repeat and customize. These emergingMobile-Fog-Cloud ecosystems still lack, indeed, customizable software tools for the performance simulation of their computing-networking building blocks. Motivated by these considerations, in this contribution, we present VirtFogSim. It is aMATLAB-supported software toolbox that allows the dynamic joint optimization and tracking of the energy and delay performance of Mobile-Fog-Cloud systems for the execution of applications described by general Directed Application Graphs (DAGs). In a nutshell, the main peculiar features of the proposed VirtFogSim toolbox are that: (i) it allows the joint dynamic energy-aware optimization of the placement of the application tasks and the allocation of the needed computing-networking resources under hard constraints on acceptable overall execution times, (ii) it allows the repeatable and customizable simulation of the resulting energy-delay performance of the overall system; (iii) it allows the dynamic tracking of the performed resource allocation under time-varying operational environments, as those typically featuring mobile applications; (iv) it is equipped with a user-friendly Graphic User Interface (GUI) that supports a number of graphic formats for data rendering, and (v) itsMATLAB code is optimized for running atop multi-core parallel execution platforms. To check both the actual optimization and scalability capabilities of the VirtFogSim toolbox, a number of experimental setups featuring different use cases and operational environments are simulated, and their performances are compared

    ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ์˜ ์ž์› ํ• ๋‹น, ๊ฐ€๊ฒฉ ๊ฒฐ์ • ๋ฐ ๊ณ ์žฅ ๊ด€๋ฆฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2013. 8. ์„œ์Šน์šฐ.๋„คํŠธ์›Œํฌ ๊ฐ€์ƒํ™”๋Š” ๋ฌผ๋ฆฌ์  ๋„คํŠธ์›Œํฌ์˜ ๊ณต์œ  ์ž์›๋“ค์„ ๋ณต์ˆ˜ ๊ฐœ์˜ ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ๋“ค์— ๋™์ ์œผ๋กœ ํ• ๋‹นํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ด์ฃผ๋Š” ๊ธฐ์ˆ ์ด๋‹ค. ์ž์› ํ• ๋‹น์˜ ์œ ์—ฐ์„ฑ๊ณผ ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ๋“ค ์‚ฌ์ด์˜ ๋…๋ฆฝ์„ฑ ๋•Œ๋ฌธ์—, ๋„คํŠธ์›Œํฌ ๊ฐ€์ƒํ™”๋Š” ๋„คํŠธ์›Œํฌ ํ…Œ์ŠคํŠธ๋ฒ ๋“œ๋ฅผ ์„ค๊ณ„ํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ๋ฐ˜ ๊ธฐ์ˆ ๋กœ์จ ์ฃผ๋กœ ํ™œ์šฉ๋˜์–ด ์™”์„ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์ธํ„ฐ๋„ท์˜ ๋‹ค์–‘ํ™”๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•œ ๋น„์šฉ ํšจ์œจ ๋†’์€ ํ•ด๊ฒฐ์ฑ…์œผ๋กœ์จ ์—ฌ๊ฒจ์ง€๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹ค. ์„œ๋น„์Šค์— ๋”ฐ๋ผ ๊ณ„์ธตํ™”๋œ ์ธํ„ฐ๋„ท์„ ์„ค๊ณ„ํ•˜๊ธฐ ์œ„ํ•œ ํ•˜๋‚˜์˜ ์ˆ˜๋‹จ์œผ๋กœ์จ, ๋„คํŠธ์›Œํฌ ๊ฐ€์ƒํ™”๋Š” ์—ฌ์ „ํžˆ ํ•ด๊ฒฐํ•ด์•ผ ํ•  ๋งŽ์€ ๋„์ „ ๊ณผ์ œ๋“ค์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ์ด ํ•™์œ„ ๋…ผ๋ฌธ์€ ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ ํ™˜๊ฒฝ์—์„œ ์ค‘์š”ํ•œ ๋ช‡ ๊ฐ€์ง€ ์ƒˆ๋กœ์šด ์—ฐ๊ตฌ ์ฃผ์ œ๋“ค์„ ์ œ์‹œํ•˜๊ณ , ๊ทธ์— ๋Œ€ํ•œ ํšจ๊ณผ์ ์ธ ํ•ด๋ฒ•๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋กœ, ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ์˜ ๋‹ค์–‘ํ•œ QoS ์š”๊ตฌ์‚ฌํ•ญ์„ ๋งŒ์กฑ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋Š” ๋„คํŠธ์›Œํฌ ์ตœ์  ๋ถ„ํ•  ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. QoS์™€ ๋Œ€์—ญํญ ์ œํ•œ ์กฐ๊ฑด์„ ๊ณ ๋ คํ•˜์—ฌ ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ ๋ถ„ํ•  ๋ฌธ์ œ๋ฅผ ์ตœ์ ํ™” ๋ฌธ์ œ๋กœ ๋ชจํ˜•ํ™”ํ•˜๊ณ , ๋ฌธ์ œ์˜ ๊ตฌ์กฐ์  ๋ณต์žก์„ฑ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ์ตœ๋‹จ ๊ฒฝ๋กœ ๋ผ์šฐํŒ…์— ๊ธฐ๋ฐ˜ํ•œ ํœด๋ฆฌ์Šคํ‹ฑ์„ ์ œ์•ˆํ•œ๋‹ค. ์‹ค์ œ ์ธํ„ฐ๋„ท ํ™˜๊ฒฝ์„ ๊ณ ๋ คํ•œ ๋Œ€๊ทœ๋ชจ ์‹คํ—˜์„ ํ†ตํ•ด, ์ œ์•ˆํ•œ ํœด๋ฆฌ์Šคํ‹ฑ์˜ ํšจ์œจ์„ฑ๊ณผ ํ™•์žฅ์„ฑ์„ ์ž…์ฆํ•œ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ์—์„œ ์ฐจ๋“ฑ ์ ‘์† ์„œ๋น„์Šค๋ฅผ ์œ„ํ•œ ๊ฒฝ์ œ์„ฑ ๋ถ„์„ ๋ชจ๋ธ์„ ์ œ์‹œํ•œ๋‹ค. ๋จผ์ € ์‚ฌ์šฉ์ž ๊ฐ€์ž… ๋ณ€๋™ ๋ชจํ˜•์ด ํ•œ ๊ฐ’์œผ๋กœ ์ˆ˜๋ ดํ•˜๊ธฐ ์œ„ํ•œ ์ถฉ๋ถ„ ์กฐ๊ฑด์„ ์œ ๋„ํ•˜๊ณ , ์ด๋Ÿฌํ•œ ์กฐ๊ฑด ํ•˜์—์„œ ์ธํ„ฐ๋„ท ์„œ๋น„์Šค ์ œ๊ณต์ž์˜ ์ˆ˜์ต์„ ์ตœ๋Œ€ํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์ ์˜ ๊ฐ€๊ฒฉ ๊ฒฐ์ • ๋ฐฉ๋ฒ• ๋ฐ ๋Œ€์—ญํญ ๋ถ„ํ•  ๋ฐฉ๋ฒ•์„ ์ฐพ๋Š”๋‹ค. ์ˆ˜์น˜ ์‹คํ—˜์„ ํ†ตํ•ด, ์ ์ ˆํ•œ ๊ฐ€๊ฒฉ ๊ฒฐ์ •๊ณผ ๋Œ€์—ญํญ ๋ถ„ํ• ์ด ์ด๋ฃจ์–ด์ง„๋‹ค๋Š” ๊ฐ€์ • ํ•˜์—์„œ ์ฐจ๋“ฑํ™” ์„œ๋น„์Šค๊ฐ€ ๋‹จ์ผ ์„œ๋น„์Šค๋ณด๋‹ค ๋” ๋†’์€ ์ˆ˜์ต์„ฑ์„ ๋‚˜ํƒ€๋‚ผ ์ˆ˜ ์žˆ์Œ์„ ์ฆ๋ช…ํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ ๊ฐ„ ํŠธ๋ž˜ํ”ฝ ์ „ํ™˜์„ ํ†ตํ•œ ๋น ๋ฅด๊ณ  ํšจ๊ณผ์ ์ธ ๊ณ ์žฅ ํšŒ๋ณต ๊ธฐ์ˆ ์„ ๊ฐœ๋ฐœํ•œ๋‹ค. ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ์˜ ๊ตฌ์กฐ์  ํŠน์„ฑ์„ ํ™œ์šฉํ•œ ๊ณ ์žฅ ํšŒ๋ณต ๊ธฐ์ˆ ์„ ์ด์šฉํ•˜๋ฉด, ๋ชจ๋“  ๋งํฌ์— ๋Œ€ํ•œ ๋ฐฑ์—… ๊ฒฝ๋กœ๊ฐ€ ํ•ญ์ƒ ์กด์žฌํ•˜๋„๋ก ๋ฏธ๋ฆฌ ํ† ํด๋กœ์ง€๋ฅผ ์„ค๊ณ„ํ•ด์•ผ ํ•  ํ•„์š”๊ฐ€ ์—†๊ณ , ๊ฐ ๋ผ์šฐํ„ฐ์—์„œ ๊ทธ ๊ฒฝ๋กœ๋“ค์— ๋Œ€ํ•œ ๊ณ„์‚ฐ์„ ๋ฏธ๋ฆฌ ํ•ด ๋†“์„ ํ•„์š”๊ฐ€ ์—†๋‹ค. ๊ทธ๋Ÿผ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ , ์ œ์•ˆํ•œ ๊ณ ์žฅ ํšŒ๋ณต ๋ฐฉ๋ฒ•์€ ๊ธฐ์กด์˜ ๊ธฐ์ˆ ๋“ค๊ณผ ๊ฐ™์€ ์ข‹์€ ์„ฑ๋Šฅ์„ ๋ณด์ธ๋‹ค. ์ด ํ•™์œ„ ๋…ผ๋ฌธ์€ ๊ฐ€์ƒ ๋„คํŠธ์›Œํฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋Š” ์ธํ„ฐ๋„ท ํ™˜๊ฒฝ์—์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ์ค‘์š”ํ•œ ๋ฌธ์ œ๋“ค์„ ๋‹ค๋ฃจ๊ณ ์ž ํ•œ๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ ์ œ์•ˆํ•˜๋Š” ๋ถ„์„ ๋ชจ๋ธ ๋ฐ ์‹คํ—˜ ๊ฒฐ๊ณผ๋“ค์€ ํ˜„์žฌ ์ธํ„ฐ๋„ท์˜ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•˜๊ณ , ๋ฏธ๋ž˜ ์ธํ„ฐ๋„ท ์•„ํ‚คํ…์ฒ˜๋ฅผ ์„ค๊ณ„ํ•˜๊ธฐ ์œ„ํ•œ ์œ ์šฉํ•œ ์ง€์นจ์„ ์ œ๊ณตํ•  ๊ฒƒ์ด๋‹ค.Network virtualization is an emerging technology that enables the dynamic partitioning of a shared physical network infrastructure into multiple virtual networks. Because of its flexibility in resource allocation and independency among virtual networks, the network virtualization technology has not only been mainly deployed to build a testbed network, but also has come to be regarded as a cost-effective solution for diversifying the Internet. As a means of building the multi-layered Internet, network virtualization still faces a number of challenging issues that need to be addressed. This dissertation deals with several important research topics and provides effective solutions in network virtualization environment. First, I focus on the optimal partitioning of finite substrate resources for satisfying the diverse QoS requirements of virtual networks. I formulate virtual network partitioning problem as a mixed integer multi-commodity flow problem. Then, to tackle the structural complexity of the problem, I propose a simple heuristic based on shortest path routing algorithm. By conducting large-scale network experiments, I verify the efficiency and scalability of the heuristic. Next, I propose an economic model for tiered access service in virtual networks in order to remedy the deficiency of the existing tiered service schemes. I first derive a sufficient condition for stability of user subscription dynamics, and find the optimal pricing and capacity partitioning by addressing the revenue maximization problem of the tiered access service in a network virtualization environment. Numerical results show that the tiered service can be more profitable than the non-tiered service under proper pricing and capacity partitioning conditions. Last, I develop a fast and effective failure recovery mechanism through inter-virtual network traffic switching in virtual networks. The proposed failure recovery mechanism neither has topological constraints for the existence of backup paths, nor requires the pre-computation of them, but nevertheless guarantees as fast recovery as the existing failure recovery methods. This dissertation aims to address important issues in the virtual network-based Internet. I believe that the analysis and results in this dissertation will provide useful guidelines to improve the Internet.1 Introduction 1.1 Background and Motivation 1.2 Contributions and Outline of the Dissertation 2 Effective Partitioning for Service Level Differentiation in Virtual Networks 2.1 Introduction 2.2 Related Work 2.3 Model and Assumption 2.3.1 Business Model 2.3.2 Network Model 2.3.3 Traffic Demands 2.3.4 QoS Metric 2.4 Formulation 2.4.1 Objective 2.4.2 Substrate Partitioning Problem 2.4.3 Decomposition 2.5 Heuristic 2.6 Evaluation 2.6.1 Small Network Experiment 2.6.2 Large Network Experiment 2.7 Summary 3 Optimal Pricing and Capacity Partitioning for Tiered Access Service in Virtual Networks 3.1 Introduction 3.2 Motivating Example 3.3 A Tiered Service Model 3.3.1 Network Virtualization Environment 3.3.2 Effective Access Rate 3.3.3 Valuation Parameter and User Utility 3.3.4 User Subscription and the ISP Revenue 3.4 Non-tiered Service Analysis 3.4.1 User Subscription Dynamics 3.4.2 Optimal Pricing for Maximizing the ISP Revenue 3.5 Tiered Service Analysis 3.5.1 User Subscription Dynamics 3.5.2 Convergence of the User Subscription Dynamics 3.5.3 Optimal Pricing for Maximizing the ISP Revenue 3.6 Numerical Results 3.6.1 Non-tiered Service Example 3.6.2 Tiered Service Example 3.7 Related Work and Discussion 3.8 Summary 4 Inter-Virtual Network Traffic Switching for Fast Failure Recovery 4.1 Introduction 4.2 Background 4.3 Preliminaries 4.3.1 Virtual Network Model 4.3.2 Design Goals 4.3.3 Business Models and Switching Policy Agreement 4.3.4 Other Considerations 4.4 Failure Recovery based on Traffic Switching 4.4.1 Inter-VN Traffic Switching 4.4.2 Failure Recovery Process 4.5 Numerical Analysis 4.5.1 Delay 4.5.2 Congestion probability 4.6 Summary 5 Conclusion A Proofs of Lemmas A.1 Proof of Lemma 2 A.2 Proof of Lemma 3Docto

    Effects of a Trust Mechanism on Complex Adaptive Supply Networks: An Agent-Based Social Simulation Study

    Get PDF
    This paper models a supply network as a complex adaptive system (CAS), in which firms or agents interact with one another and adapt themselves. And it applies agent-based social simulation (ABSS), a research method of simulating social systems under the CAS paradigm, to observe emergent outcomes. The main purposes of this paper are to consider a social factor, trust, in modeling the agents\' behavioral decision-makings and, through the simulation studies, to examine the intermediate self-organizing processes and the resulting macro-level system behaviors. The simulations results reveal symmetrical trust levels between two trading agents, based on which the degree of trust relationship in each pair of trading agents as well as the resulting collaboration patterns in the entire supply network emerge. Also, it is shown that agents\' decision-making behavior based on the trust relationship can contribute to the reduction in the variability of inventory levels. This result can be explained by the fact that mutual trust relationship based on the past experiences of trading diminishes an agent\'s uncertainties about the trustworthiness of its trading partners and thereby tends to stabilize its inventory levels.Complex Adaptive System, Agent-Based Social Simulation, Supply Network, Trust

    Efficient sharing mechanisms for virtualized multi-tenant heterogeneous networks

    Get PDF
    The explosion in data traffic, the physical resource constraints, and the insufficient financial incentives for deploying 5G networks, stress the need for a paradigm shift in network upgrades. Typically, operators are also the service providers, which charge the end users with low and flat tariffs, independently of the service enjoyed. A fine-scale management of the network resources is needed, both for optimizing costs and resource utilization, as well as for enabling new synergies among network owners and third-parties. In particular, operators could open their networks to third parties by means of fine-scale sharing agreements over customized networks for enhanced service provision, in exchange for an adequate return of investment for upgrading their infrastructures. The main objective of this thesis is to study the potential of fine-scale resource management and sharing mechanisms for enhancing service provision and for contributing to a sustainable road to 5G. More precisely, the state-of-the-art architectures and technologies for network programmability and scalability are studied, together with a novel paradigm for supporting service diversity and fine-scale sharing. We review the limits of conventional networks, we extend existing standardization efforts and define an enhanced architecture for enabling 5G networks' features (e.g., network-wide centralization and programmability). The potential of the proposed architecture is assessed in terms of flexible sharing and enhanced service provision, while the advantages of alternative business models are studied in terms of additional profits to the operators. We first study the data rate improvement achievable by means of spectrum and infrastructure sharing among operators and evaluate the profit increase justified by a better service provided. We present a scheme based on coalitional game theory for assessing the capability of accommodating more service requests when a cooperative approach is adopted, and for studying the conditions for beneficial sharing among coalitions of operators. Results show that: i) collaboration can be beneficial also in case of unbalanced cost redistribution within coalitions; ii) coalitions of equal-sized operators provide better profit opportunities and require lower tariffs. The second kind of sharing interaction that we consider is the one between operators and third-party service providers, in the form of fine-scale provision of customized portions of the network resources. We define a policy-based admission control mechanism, whose performance is compared with reference strategies. The proposed mechanism is based on auction theory and computes the optimal admission policy at a reduced complexity for different traffic loads and allocation frequencies. Because next-generation services include delay-critical services, we compare the admission control performances of conventional approaches with the proposed one, which proves to offer near real-time service provision and reduced complexity. Besides, it guarantees high revenues and low expenditures in exchange for negligible losses in terms of fairness towards service providers. To conclude, we study the case where adaptable timescales are adopted for the policy-based admission control, in order to promptly guarantee service requirements over traffic fluctuations. In order to reduce complexity, we consider the offline preยญcomputation of admission strategies with respect to reference network conditions, then we study the extension to unexplored conditions by means of computationally efficient methodologies. Performance is compared for different admission strategies by means of a proof of concept on real network traces. Results show that the proposed strategy provides a tradeoff in complexity and performance with respect to reference strategies, while reducing resource utilization and requirements on network awareness.La explosion del trafico de datos, los recursos limitados y la falta de incentivos para el desarrollo de 5G evidencian la necesidad de un cambio de paradigma en la gestion de las redes actuales. Los operadores de red suelen ser tambien proveedores de servicios, cobrando tarifas bajas y planas, independientemente del servicio ofrecido. Se necesita una gestion de recursos precisa para optimizar su utilizacion, y para permitir nuevas sinergias entre operadores y proveedores de servicios. Concretamente, los operadores podrian abrir sus redes a terceros compartiendolas de forma flexible y personalizada para mejorar la calidad de servicio a cambio de aumentar sus ganancias como incentivo para mejorar sus infraestructuras. El objetivo principal de esta tesis es estudiar el potencial de los mecanismos de gestion y comparticion de recursos a pequei\a escala para trazar un camino sostenible hacia el 5G. En concreto, se estudian las arquitecturas y tecnolog fas mas avanzadas de "programabilidad" y escalabilidad de las redes, junto a un nuevo paradigma para la diversificacion de servicios y la comparticion de recursos. Revisamos los limites de las redes convencionales, ampliamos los esfuerzos de estandarizacion existentes y definimos una arquitectura para habilitar la centralizacion y la programabilidad en toda la red. La arquitectura propuesta se evalua en terminos de flexibilidad en la comparticion de recursos, y de mejora en la prestacion de servicios, mientras que las ventajas de un modelo de negocio alternativo se estudian en terminos de ganancia para los operadores. En primer lugar, estudiamos el aumento en la tasa de datos gracias a un uso compartido del espectro y de las infraestructuras, y evaluamos la mejora en las ganancias de los operadores. Presentamos un esquema de admision basado en la teoria de juegos para acomodar mas solicitudes de servicio cuando se adopta un enfoque cooperativo, y para estudiar las condiciones para que la reparticion de recursos sea conveniente entre coaliciones de operadores. Los resultados ensei\an que: i) la colaboracion puede ser favorable tambien en caso de una redistribucion desigual de los costes en cada coalicion; ii) las coaliciones de operadores de igual tamai\o ofrecen mejores ganancias y requieren tarifas mas bajas. El segundo tipo de comparticion que consideramos se da entre operadores de red y proveedores de servicios, en forma de provision de recursos personalizada ya pequei\a escala. Definimos un mecanismo de control de trafico basado en polfticas de admision, cuyo rendimiento se compara con estrategias de referencia. El mecanismo propuesto se basa en la teoria de subastas y calcula la politica de admision optima con una complejidad reducida para diferentes cargas de trafico y tasa de asignacion. Con particular atencion a servicios 5G de baja latencia, comparamos las prestaciones de estrategias convencionales para el control de admision con las del metodo propuesto, que proporciona: i) un suministro de servicios casi en tiempo real; ii) una complejidad reducida; iii) unos ingresos elevados; y iv) unos gastos reducidos, a cambio de unas perdidas insignificantes en terminos de imparcialidad hacia los proveedores de servicios. Para concluir, estudiamos el caso en el que se adoptan escalas de tiempo adaptables para el control de admision, con el fin de garantizar puntualmente los requisitos de servicio bajo diferentes condiciones de trafico. Para reducir la complejidad, consideramos el calculo previo de las estrategias de admision con respecto a condiciones de red de referenda, adaptables a condiciones inexploradas por medio de metodologias computacionalmente eficientes. Se compara el rendimiento de diferentes estrategias de admision sobre trazas de trafico real. Los resultados muestran que la estrategia propuesta equilibra complejidad y ganancias, mientras se reduce la utilizacion de recursos y la necesidad de conocer el estado exacto de la red.Postprint (published version

    Calidad de servicio en computaciรณn en la nube: tรฉcnicas de modelado y sus aplicaciones

    Get PDF
    Recent years have seen the massive migration of enterprise applications to the cloud. One of the challenges posed by cloud applications is Quality-of-Service (QoS) management, which is the problem of allocating resources to the application to guarantee a service level along dimensions such as performance, availability and reliability. This paper aims at supporting research in this area by providing a survey of the state of the art of QoS modeling approaches suitable for cloud systems. We also review and classify their early application to some decision-making problems arising in cloud QoS management

    Cloud Workload Allocation Approaches for Quality of Service Guarantee and Cybersecurity Risk Management

    Get PDF
    It has become a dominant trend in industry to adopt cloud computing --thanks to its unique advantages in flexibility, scalability, elasticity and cost efficiency -- for providing online cloud services over the Internet using large-scale data centers. In the meantime, the relentless increase in demand for affordable and high-quality cloud-based services, for individuals and businesses, has led to tremendously high power consumption and operating expense and thus has posed pressing challenges on cloud service providers in finding efficient resource allocation policies. Allowing several services or Virtual Machines (VMs) to commonly share the cloud\u27s infrastructure enables cloud providers to optimize resource usage, power consumption, and operating expense. However, servers sharing among users and VMs causes performance degradation and results in cybersecurity risks. Consequently, how to develop efficient and effective resource management policies to make the appropriate decisions to optimize the trade-offs among resource usage, service quality, and cybersecurity loss plays a vital role in the sustainable future of cloud computing. In this dissertation, we focus on cloud workload allocation problems for resource optimization subject to Quality of Service (QoS) guarantee and cybersecurity risk constraints. To facilitate our research, we first develop a cloud computing prototype that we utilize to empirically validate the performance of different proposed cloud resource management schemes under a close to practical, but also isolated and well-controlled, environment. We then focus our research on the resource management policies for real-time cloud services with QoS guarantee. Based on queuing model with reneging, we establish and formally prove a series of fundamental principles, between service timing characteristics and their resource demands, and based on which we develop several novel resource management algorithms that statically guarantee the QoS requirements for cloud users. We then study the problem of mitigating cybersecurity risk and loss in cloud data centers via cloud resource management. We employ game theory to model the VM-to-VM interdependent cybersecurity risks in cloud clusters. We then conduct a thorough analysis based on our game-theory-based model and develop several algorithms for cybersecurity risk management. Specifically, we start our cybersecurity research from a simple case with only two types of VMs and next extend it to a more general case with an arbitrary number of VM types. Our intensive numerical and experimental results show that our proposed algorithms can significantly outperform the existing methodologies for large-scale cloud data centers in terms of resource usage, cybersecurity loss, and computational effectiveness
    • โ€ฆ
    corecore