572 research outputs found

    Monitoring Large-Scale Cloud Systems with Layered Gossip Protocols

    Full text link
    Monitoring is an essential aspect of maintaining and developing computer systems that increases in difficulty proportional to the size of the system. The need for robust monitoring tools has become more evident with the advent of cloud computing. Infrastructure as a Service (IaaS) clouds allow end users to deploy vast numbers of virtual machines as part of dynamic and transient architectures. Current monitoring solutions, including many of those in the open-source domain rely on outdated concepts including manual deployment and configuration, centralised data collection and adapt poorly to membership churn. In this paper we propose the development of a cloud monitoring suite to provide scalable and robust lookup, data collection and analysis services for large-scale cloud systems. In lieu of centrally managed monitoring we propose a multi-tier architecture using a layered gossip protocol to aggregate monitoring information and facilitate lookup, information collection and the identification of redundant capacity. This allows for a resource aware data collection and storage architecture that operates over the system being monitored. This in turn enables monitoring to be done in-situ without the need for significant additional infrastructure to facilitate monitoring services. We evaluate this approach against alternative monitoring paradigms and demonstrate how our solution is well adapted to usage in a cloud-computing context.Comment: Extended Abstract for the ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC 2013) Poster Trac

    Observing the clouds : a survey and taxonomy of cloud monitoring

    Get PDF
    This research was supported by a Royal Society Industry Fellowship and an Amazon Web Services (AWS) grant. Date of Acceptance: 10/12/2014Monitoring is an important aspect of designing and maintaining large-scale systems. Cloud computing presents a unique set of challenges to monitoring including: on-demand infrastructure, unprecedented scalability, rapid elasticity and performance uncertainty. There are a wide range of monitoring tools originating from cluster and high-performance computing, grid computing and enterprise computing, as well as a series of newer bespoke tools, which have been designed exclusively for cloud monitoring. These tools express a number of common elements and designs, which address the demands of cloud monitoring to various degrees. This paper performs an exhaustive survey of contemporary monitoring tools from which we derive a taxonomy, which examines how effectively existing tools and designs meet the challenges of cloud monitoring. We conclude by examining the socio-technical aspects of monitoring, and investigate the engineering challenges and practices behind implementing monitoring strategies for cloud computing.Publisher PDFPeer reviewe

    Academic Cloud Computing Research: Five Pitfalls and Five Opportunities

    Get PDF
    This discussion paper argues that there are five fundamental pitfalls, which can restrict academics from conducting cloud computing research at the infrastructure level, which is currently where the vast majority of academic research lies. Instead academics should be conducting higher risk research, in order to gain understanding and open up entirely new areas. We call for a renewed mindset and argue that academic research should focus less upon physical infrastructure and embrace the abstractions provided by clouds through five opportunities: user driven research, new programming models, PaaS environments, and improved tools to support elasticity and large-scale debugging. The objective of this paper is to foster discussion, and to define a roadmap forward, which will allow academia to make longer-term impacts to the cloud computing community.Comment: Accepted and presented at the 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud'14

    Schoenberg Today: the Views of some Contemporary Composers

    Get PDF
      &nbsp

    Binar Space Program: Mission Two Payloads and Operations Plan

    Get PDF
    The second mission of Western Australia’s Binar Space Program consists of three 1U CubeSats targeting a 2023 launch. Aiming to improve the platform for future missions, the primary purpose of Binar 2, 3 and 4 is on-orbit testing of radiation shielding alloys developed by CSIRO. In this first-of-its-kind experiment, all three simultaneously deployed Binar spacecraft will contain radiation sensing payloads to assess the efficacy of various compositions of Australian made radiation shielding alloys. Alongside this, hardware changes to the Binar platform are discussed, including deployable solar arrays, additional communications solutions, and a removable payload bay. The Iridium network will be leveraged to test its suitability for CubeSat targeted re-entry. Several software-based payloads are implemented, including on-board hardware emulation, enabling an industry partner to control the spacecraft in a demonstration of remote operations capability. An undergraduate student lead project will continue on from Binar-1 to see a star tracker flown for testing alternative methods of attitude determination. From a community perspective, strengthening the engagement between amateur radio operators and the Binar Space Program will be explored by expanding on what amateurs can do with on-orbit satellites. Lastly, autonomous agile mission planning will be tested through an on-board multipurpose simulation running on the dual-core flight computer

    How to prioritize species recovery after a megafire

    Get PDF
    Due to climate change, megafires are increasingly common and have sudden, extensive impacts on many species over vast areas, leaving decision makers uncertain about how best to prioritize recovery. We devised a decision-support framework to prioritize conservation actions to improve species outcomes immediately after a megafire. Complementary locations are selected to extend recovery actions across all fire-affected species' habitats. We applied our method to areas burned in the 2019-2020 Australian megafires and assessed its conservation advantages by comparing our results with outcomes of a site-richness approach (i.e., identifying areas that cost-effectively recover the most species in any one location). We found that 290 threatened species were likely severely affected and will require immediate conservation action to prevent population declines and possible extirpation. We identified 179 subregions, mostly in southeastern Australia, that are key locations to extend actions that benefit multiple species. Cost savings were over AU$300 million to reduce 95% of threats across all species. Our complementarity-based prioritization also spread postfire management actions across a wider proportion of the study area compared with the site-richness method (43% vs. 37% of the landscape managed, respectively) and put more of each species' range under management (average 90% vs. 79% of every species' habitat managed). In addition to wildfire response, our framework can be used to prioritize conservation actions that will best mitigate threats affecting species following other extreme environmental events (e.g., floods and drought)

    SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security

    Get PDF
    Cyber situational awareness is an essential part of cyber defense that allows the cybersecurity operators to cope with the complexity of today's networks and threat landscape. Perceiving and comprehending the situation allow the operator to project upcoming events and make strategic decisions. In this paper, we recapitulate the fundamentals of cyber situational awareness and highlight its unique characteristics in comparison to generic situational awareness known from other fields. Subsequently, we provide an overview of existing research and trends in publishing on the topic, introduce front research groups, and highlight the impact of cyber situational awareness research. Further, we propose an updated taxonomy and enumeration of the components used for achieving cyber situational awareness. The updated taxonomy conforms to the widely-accepted three-level definition of cyber situational awareness and newly includes the projection level. Finally, we identify and discuss contemporary research and operational challenges, such as the need to cope with rising volume, velocity, and variety of cybersecurity data and the need to provide cybersecurity operators with the right data at the right time and increase their value through visualization
    • …
    corecore