AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
View PDF
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Estimation of Cloud Node Acquisition

Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNLIST), Tsinghua University, Beijing 100084, China
Research Institute of Tsinghua University in Shenzhen, Shenzhen 518057, China
Show Author Information

Abstract

Over the past decade, there has been a paradigm shift leading consumers and enterprises to the adoption of cloud computing services. Even though most cases are still in the early stages of transition, there has been a steady increase in the implementation of the pay-as-you-go or pay-as-you-grow models offered by cloud providers. Whether applied as an extension of virtual infrastructure, software, or platform as a service, many users are still challenged by the estimation of adequate resource allocation and the wide variations in pricing. Customers require a simple method of predicting future demand in terms of the number of nodes to be allocated in the cloud environment. In this paper, we review and discuss existing methodologies for estimating the demand for cloud nodes and their corresponding pricing policies. Based on our review, we propose a novel approach using the Hidden Markov Model to estimate the acquisition of cloud nodes.

References

[1]
E. Caron, F. Desprez, and A. Muresan, Forecasting for grid and cloud computing on-demand resources based on pattern matching, in Proc. IEEE CloudCom., 2010.
DOI
[2]
N. Huber, M. von Quast, M. Hauck, and S. Kounev, Evaluating and modeling virtualization performance overhead for cloud environments, in 1st International Conference on Cloud Computing and Services Science (CLOSER 2011), Noordwijkerhout, The Netherlands, 2011.
[3]
C. S. Pawar and R.B. Wagh, A review of resource allocation policies in cloud computing, World Journal of Science and Technology, vol. 2, no. 3, pp. 165-167, 2012.
[4]
J. Li, M. Qiu, J. W. Niu, Y. Chen, and Z. Ming, Adaptive resource allocation for preempt able jobs in cloud systems, in IEEE International Conference on Intelligent Systems Design and Applications, 2010, pp. 31-36.
DOI
[5]
B. Chen, C. Y. Lai, and Y. L. Huang, A performance mapping model for physical-to-virtual migration, in Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on, 2013.
DOI
[6]
R. Buyya, R. Ranjan, and R. N. Calheiros, InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services, in Algorithms and Architectures for Parallel Processing, Springer, 2010, pp. 13-31.
DOI
[7]
Y. Demchenko, J. Ven der Ham, R. Strijkers, and M. Ghijsen, Generic architecture for cloud Infrastructure as a service (IaaS) provisioning model, Release 1. SNE Techn. Report SNE-UVA-2011-03, http://staff.science.uva.nl/~demch/worksinprogress/sne2011-techreport-2011-03-clouds-iaasarchitecture-release1.pdf, 2011.
DOI
[8]
D. Armstrong and K. Djemame, Performance issues in clouds: An evaluation of virtual image propagation and I/O paravirtualization, The Computer Journal, vol. 54, no. 6, pp. 836-849, 2011.
[9]
A. Quiroz, H. Kim, M. Parashar, N. Gnanasambandam, and N. Sharma, Towards autonomic workload provisioning for enterprise grids and clouds, in Grid Computing, 2009 10th IEEE/ACM International Conference on, 2009, pp. 50-57.
DOI
[10]
Q. Zhang, L. Cheng, and R. Boutaba, Cloud computing: State-of-the-art and research challenges, Journal of Internet Services and Applications, vol. 1, no. 1, pp. 7-18, 2010.
[11]
W. Ahmed and Y. Wu, A survey on reliability in distributed systems, Journal of Computer and System Sciences, vol. 79, no. 8, pp. 1243-1255, 2013.
[12]
L. Vaquero, L. Rodero-Merino, and D. Moran, Locking the sky: A survey on IaaS cloud security, Computing, vol. 91, no. 1, pp. 93-118, 2011.
[13]
A. Iosup, R. Prodan, and D. Epema, Iaas cloud benchmarking: Approaches, challenges, and experience, in Proc. of the Intl Conf. on High Performance Networking and Computing (SC), 2013.
DOI
[14]
C. Procter, Virtual servers; real problems, http:// www.continuitycentral.com/virtualserversrealproblems.pdf, 2007.
[15]
W. Ahmed and Y. Wu, Probabilistic QoS analysis of web services, in Network and Parallel Computing, Springer, 2013, pp. 393-404.
DOI
[16]
M. Pearce, M. Zeadally, and R. Hunt, Virtualization: Issues, security threats, and solutions, ACM Comput. Surv., vol. 45, no. 2, pp. 1-39, 2013.
[17]
P. Kedia, R. Nagpal, and T. P. Singh, Article: A survey on virtualization service providers, International Journal of Computer Applications, vol. 69, no. 24, pp. 36-42, 2013.
[18]
S. Ibrahim, B. He, and H. Jin, Towards pay-as-you-consume cloud computing, in Services Computing (SCC), 2011 IEEE International Conference on, 2011, pp. 370-377.
DOI
[19]
F. Salfner, Predicting failures with hidden Markov models, in Proceedings of 5th European Dependable Computing Conference, 2005.
[20]
R. Piotr, Z. Steffen, and K. Samuel, A meta-model for performance modeling of dynamic virtualized network infrastructures, in Proceedings of the 4th ACM/SPEC International Conference on Performance Engineering, ACM, 2013.
[21]
C. S. Yeo and R. Buyya, A taxonomy of market-based resource management systems for utility-driven cluster computing, Software Practice and Experience, vol. 36, no. 13, article no.13811419, 2006.
[22]
F. Wu, L. Zhang, and B. Huberman, Truth-telling reservations, Algorithmica, vol. 52, no. 1, pp. 65-79, 2008.
[23]
H. Kang, X. Zhu, and J. L. Wong, DAPA: Diagnosing application performance anomalies for virtualized infrastructures, in Proceedings of the 2nd Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, San Jose, CA, USA, 2012, p. 16.
[24]
E. Caron, F. Desprez, and A. Muresan, Forecasting for grid and cloud computing on-demand resources based on pattern matching, in Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, 2010, pp. 456-463.
DOI
[25]
F. Benevenuto, Performance models for virtualized applications, in Frontiers of High Performance Computing and Networking-ISPA 2006 Workshops, Springer, 2006, pp. 427-439.
DOI
[26]
S. Banerjee, H. Srikanth, and C. Bojan, Log-based reliability analysis of software as a service (SaaS), in Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 2010, pp. 239-248.
DOI
[27]
M. E. Frncu, Scheduling highly available applications on cloud environments, Future Generation Computer Systems, vol. 32, pp. 138-153, 2014.
[28]
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, Xen and the art of virtualization, presented at Symposium on Operating Systems Principles, 2003.
DOI
[29]
P. Padala, X. Zhu, Z. Wang, S. Singhal, and K. G. Shin, Performance evaluation of virtualization technologies for server consolidation, HP Labs Tec. Report, 2007.
[30]
B. Quetier, V. Neri, and F. Cappello, Scalability comparison of four host virtualization tools, Journal on Grid Computing, vol. 5, no. 1, p. 8398, 2007.
[31]
S. Soltesz, H. Potzl, M. E. Fiuczynski, A. Bavier, and L. Peterson, Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors, SIGOPS Oper. Syst. Rev., vol. 41, no. 3, pp. 275-287, 2007.
[32]
N. Huber, M. von Quast, F. Brosig, and S. Kounev, Analysis of the performance-influencing factors of virtualization platforms, Lecture Notes in Computer Science, vol. 6427, pp. 811-828, 2010.
[33]
A. A. Bankole and S. A. Ajila, Cloud client prediction models for cloud resource provisioning in a multitier web application environment, in Service Oriented System Engineering (SOSE), 2013 IEEE 7th International Symposium, 2013.
DOI
[34]
Q. Noorshams and S. Kounev, Experimental evaluation of the performance-influencing factors of virtualized storage systems, Lecture Notes in Computer Science, vol. 7587, pp. 63-79, 2013.
[35]
S. Kraft, G. Casale, D. Krishnamurthy, D. Greer, and P. Kilpatrick, Performance models of storage contention in cloud environments, Software & Systems Modeling, vol. 12, no. 4, pp. 681-704, 2013.
[36]
N. Huber, M. von Quast, F. Brosig, M. Hauck, and S. Kounev, A method for experimental analysis and modeling of virtualization performance overhead, Cloud Computing and Services Science, pp. 353-370, 2012.
DOI
[37]
D. Bruhn, Modeling and experimental analysis of virtualized storage performance using IBM systems as example, Master’s degree dissertation, Karlsruhe Institute of Technology, Karlsruhe, Germany, 2012.
[38]
S. Kundu, R. Rangaswami, K. Dutta, and M. Zhao, Application performance modeling in a virtualized environment, in High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on, 2010, p. 110.
DOI
[39]
J. Wiegert, G. Regnier, and J. Jackson, Challenges for scalable networking in a virtualized server, in Computer Communications and Networks, 2007. ICCCN 2007. Proceedings of 16th International Conference on, 2007, pp. 179-184.
DOI
[40]
D. D. Chambliss, G. A. Alvarez, P. Pandey, D. Jadav, J. Xu, R. Menon, and T. P. Lee, Performance virtualization for largescale storage systems, in Reliable Distributed Systems, 2003. Proceedings of 22nd International Symposium on, 2003.
[41]
G. Casale, S. Kraft, and D. Krishnamurthy, A model of storage I/O performance interference in virtualized systems, in Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, 2011.
DOI
[42]
S. Kraft, G. Casale, D. Krishnamurthy, D. Greer, and P. Kilpatrick, IO performance prediction in consolidated virtualized environments, in Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering, ACM, 2011.
DOI
[43]
S. Becker, H. Koziolek, and R. Reussner, The Palladio component model for model-driven performance prediction, Journal of Systems and Software, vol. 82, no. 1, p. 322, 2009.
[44]
R. Puigjaner, Performance modelling of computer networks, in Proc. of the IFIP/ACM Latin America Conf. on Towards a Latin American Agenda for Network Research, New York, NY, USA, 2003, p. 106123.
DOI
[45]
I. Dietrich, F. Dressler, V. Schmitt, and R. German, SYNTONY: Network protocol simulation based on standard-conform UML2 models, in Proc. of the ValueTools 07, 2007.
DOI
[46]
N. de Wet and P. Kritzinger, Using UML models for the performance analysis of network systems, Comput. Netw., vol. 49, no. 5, pp. 627-642, 2005.
[47]
N. Huber, S. Becker, C. Rathfielder, J. Schweflinghaus and R. H. Reussner, Performance modeling in industry: A case study on storage virtualization, in Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, Cape Town, South Africa, 2010.
DOI
[48]
S. Verboven, K. Vanmechelen, and J. Broeckhove, Black box scheduling for resource intensive virtual machine workloads with interference models, Future Generation Computer Systems, vol. 29, no. 8, pp. 1871-1884, 2013.
[49]
L. L. Chen, Q. Wang, W. Xu, and L. Zhang, Evaluating the survivability of SOA systems based on HMM, in Proceedings of the IEEE International Conference on Web Services, 2010.
DOI
[50]
G. Rahnavard, M. S. A. Najjar, and S. Taherifar, A method to evaluate Web services anomaly detection using hidden Markov models, in Computer Applications and Industrial Electronics (ICCAIE), 2010 International Conference, 2010.
DOI
[51]
M. Zaki, A. Ihsan, and B. Athman, Web services reputation assessment using a hidden Markov model, in Proceedings of the 7th International Joint Conference on Service-Oriented Computing, 2009.
Tsinghua Science and Technology
Pages 1-12
Cite this article:
Ahmed W, Wu Y. Estimation of Cloud Node Acquisition. Tsinghua Science and Technology, 2014, 19(1): 1-12. https://doi.org/10.1109/TST.2014.6733202

439

Views

16

Downloads

4

Crossref

N/A

Web of Science

5

Scopus

0

CSCD

Altmetrics

Received: 02 December 2013
Revised: 17 December 2013
Accepted: 18 December 2013
Published: 07 February 2014
© The author(s) 2014
Return