Net-Centric Software and Systems I/UCRC Copyright © 2011 NSF Net-Centric I/UCRC. All Rights Reserved. High-Confidence SLA Assurance for Cloud Computing.

Slides:



Advertisements
Similar presentations
An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Advertisements

Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
1 Christophe S. Jelger, Michael Kleis, Burak Simsek, Rolf Stadler, Ralf König, Danny Raz Theories/formal methods in support of autonomic management Dagstuhl.
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
CprE 458/558: Real-Time Systems (G. Manimaran)1 CprE 458/558: Real-Time Systems (m, k)-firm tasks and QoS enhancement.
Grant agreement n° SDN architectures for orchestration of mobile cloud services with converged control of wireless access and optical transport network.
Dynamic Service Composition with QoS Assurance Feb , 2009 Jing Dong UTD Farokh Bastani UTD I-Ling Yen UTD.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Ashish Gupta Under Guidance of Prof. B.N. Jain Department of Computer Science and Engineering Advanced Networking Laboratory.
Azad Madni Professor Director, SAE Program Viterbi School of Engineering Platform-based Engineering: Rapid, Risk-mitigated Development.
Date: 03/05/2007 Vendor Management and Metrics. 2 A.T. Kearney X/mm.yyyy/00000 AT Kearney’s IT/Telecom Vendor Facts IT/Telecom service, software and equipment.
Network Enabled Capability Through Innovative Systems Engineering Service Oriented Integration of Systems for Military Capability Duncan Russell, Nik Looker,
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
New Challenges in Cloud Datacenter Monitoring and Management
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
23 September 2004 Evaluating Adaptive Middleware Load Balancing Strategies for Middleware Systems Department of Electrical Engineering & Computer Science.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. EMC Proven Professional INFORMATION STORAGE AND MANAGEMENT V2 Course Introduction.
A Research Agenda for Accelerating Adoption of Emerging Technologies in Complex Edge-to-Enterprise Systems Jay Ramanathan Rajiv Ramnath Co-Directors,
©2013 Avaya Inc. All rights reservedFebruary 26-28, 2013 | Orlando, FL.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Plug-In B17 Organizational Architecture Trends.
© 2008 IBM Corporation Challenges for Infrastructure Outsourcing July 29, 2011 Atul Gupta Vice President, Strategic Outsourcing, IBM.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Net-Centric Software and Systems I/UCRC A Framework for QoS and Power Management for Mobile Devices in Service Clouds Project Lead: I-Ling Yen, Farokh.
MTBC Cloud Computing Initiative  Applications of cloud computing  Overview of the NSF Net-Centric Software and Systems (NCSS) I/UCRC  MTBC and NCSS.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
Cracow Grid Workshop ‘06 17 October 2006 Execution Management and SLA Enforcement in Akogrimo Antonios Litke Antonios Litke, Kleopatra Konstanteli, Vassiliki.
Process: A Generic View
Project Portfolio Management Business Priorities Presentation.
1 V&V Needs for NextGen of 2025 and Beyond A JPDO Perspective Maureen Keegan JPDO Integration Manager October 13, 2010.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Group member: Kai Hu Weili Yin Xingyu Wu Yinhao Nie Xiaoxue Liu Date:2015/10/
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing Bharat Bhargava, Pelin Angin, Rohit Ranchal Department of Computer.
Multiagent System Katia P. Sycara 일반대학원 GE 랩 성연식.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
CLOUD COMPUTING AND LESSONS FROM THE PAST Presented By Sanjana Malhotra.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Net-Centric Software and Systems I/UCRC Self-Detection of Abnormal Event Sequences Project Lead: Farokh Bastani, I-Ling Yen, Latifur Khan Date: April 1,
Net-Centric Software and Systems I/UCRC A Framework for QoS and Power Management for Mobile Devices in Service Clouds Project Lead: I-Ling Yen, Farokh.
FLARe: a Fault-tolerant Lightweight Adaptive Real-time Middleware for Distributed Real-time and Embedded Systems Dr. Aniruddha S. Gokhale
Control-Theoretic Approaches for Dynamic Information Assurance George Vachtsevanos Georgia Tech Working Meeting U. C. Berkeley February 5, 2003.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
ROLE OF ANALYTICS IN ENHANCING BUSINESS RESILIENCY.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Chapter 1 Characterization of Distributed Systems
SAP and IBM Delivering value together
Monitoring Storage Systems for Oracle Enterprise Manager 12c
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
Monitoring Storage Systems for Oracle Enterprise Manager 12c
Transforming IT Management
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Computer Services Business challenge
Computer Services Business challenge
Self-Managed Systems: an Architectural Challenge
Capitalize on Your Business’s Technology
Presentation Title August 8, 2019
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Presentation Title September 22, 2019
Presentation transcript:

Net-Centric Software and Systems I/UCRC Copyright © 2011 NSF Net-Centric I/UCRC. All Rights Reserved. High-Confidence SLA Assurance for Cloud Computing Systems and Services Project Lead: Farokh B. Bastani, I-Ling Yen, Krishna Kavi, and Jeff Tian Date: April 7, 2011

Emerging cloud computing paradigm enables – On-demand access to storage, computing, software, and physical resources – Integrated capabilities of a large spectrum of networked services and resources for realizing tasks that are far beyond current practices  Need SLA to enhance cloud system usability and dependability Existing SLA (service level agreement) research: Siloed – SLA model: Consider agreement for each QoS aspect independently – Client perspective Need to establish SLAs one service at a time, lacking an end-to-end approach for the client task that require composing multiple services/resources Consider individual QoS aspects independently, not potential tradeoffs – Provider perspective Each provider operates independently, lacks a collaborative concept to globally achieve high SLA assurance while maximizing resource utilization – No satisfactory solutions to security issues across all layers Challenges: Develop a comprehensive SLA model and supporting environment Problem Description 2

Proposed Solution 3 Local QoS Monitoring Resource Management Admission Control feedback S R R R R S S Provider 1 Local QoS Monitoring Resource Management Admission Control feedback S R S Provider 2 R R Local QoS Monitoring Resource Management feedback Provider 3 Admission Control Local QoS Monitoring Resource Management Admission Control feedback Provider N Service Composer SLA for first service SLA for second service... Fail to get agreement Integrated SLA Monitoring - Agent based distributed monitoring and behavior integration - Rule based approach, formalize SLAs as rules, events as facts, and use reasoning to derive the violation situations - Consider fuzzy violation decision models - Across providers and resource types - Proactive SLA assurance (recovery) - Perform end-to-end QoS analysis before SLAs May need reservations to avoid new failures - Consider QoS aspects holistically and directly determine the configuration parameters to fully control tradeoffs  Improve SLA model to support holistic SLA Improved SLA protocol: First determine with which providers and levels of QoS Then preliminarily check the possibility of getting the SLAs Finally establish the SLAs client At each provider: - Consider strict & flexible SLAs - Develop optimal resource management and admission control schemes - Formulation: optimization problem with the objective of maximizing the gain, given task completion rewards and violation penalties and the available resources - Admit only if positive gain - Local monitoring and online reconfiguration - Ensure SLAs are satisfied if resources are sufficient; if not, adjust resource decisions Probabilistic SLAs to collaboratively get backup resources under failure or extreme load Form cloud community

2011 New Project Summary 2011 New Project Summary High-Confidence SLA Assurance for Cloud Computing Systems and Services 4 Tasks: 1.Comprehensive model of cloud SLAs considering correlations of QoS aspects and end-to-end QoS requirements 2.Integrated SLA monitoring approach across providers and resource types 3.Optimal adaptive strategies for assuring SLAs under normal and failure situations 4.Method of assessing system-level SLAs based on component-level SLAs 5.Layered collaborative approach for optimally achieving global SLA assurance by leveraging resources from multiple cloud domains Research Goals: 1.Improved SLA models and protocols to facilitate highly dependable and practically usable cloud computing 2.Optimal supporting environment for SLA assurance considering end-to-end QoS and QoS tradeoffs and achieving local as well as global monitoring, resource management, and admission control Benefits to Industry Partners: 1.Advanced cloud technologies to meet specified SLAs to a high degree of confidence in spite of multiple failures 2.Enable cloud computing to be used for critical applications, including health-care systems, emergency response systems, defense systems, transportation systems, etc. Project Schedule: A M J J A S O N D J F M A 1112 Task 1: SLA model Task 2: Integrated SLA monitoring Task 3: Optimal adaptive SLA assurance