Ugo Giordano Tutor: Prof. Stefano Russo XXIX Cycle - I year presentation Cloud systems overload management.

Slides:



Advertisements
Similar presentations
1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
Advertisements

SLA-Oriented Resource Provisioning for Cloud Computing
Software Quality Assurance Plan
By Adam Balla & Wachiu Siu
Cloud Testing – Guidelines and Approach. Agenda Understanding “The Cloud”? Why move to Cloud? Testing Philosophy Challenges Guidelines to select a Cloud.
7-1 INTRODUCTION: SoA Introduced SoA in Chapter 6 Service-oriented architecture (SoA) - perspective that focuses on the development, use, and reuse of.
Green Cloud Computing Hadi Salimi Distributed Systems Lab, School of Computer Engineering, Iran University of Science and Technology,
MetriCon 2.0 Correlating Automated Static Analysis Alert Density to Reported Vulnerabilities in Sendmail Michael Gegick, Laurie Williams North Carolina.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Software Testing and Quality Attributes Software Testing Module ( ) Dr. Samer Hanna.
System Analysis and Optimization 1 1 Efficient Resource Provisioning in Compute Clouds via VM Multiplexing Xiaoqiao Meng, Canturk Isci, Jeffrey Kephart,
Presented by: Rajdeep Biswas Roll No.: 0104IT071082; Branch: IT (VII Sem.) R.K.D.F. Institute of Science & Technology Cloud Computing When Outsourcing.
Prof. Seppo Virtanen TUT PURESAFE Final Conference Tuesday 20 January 2015, 14:20 – 14:40 RAMS Methods and Tools: From LHC to FCC.
Aims and Motivation The goal of this project is to produce a secure and dependable way of distributing and storing data securely over a distributed system.
SIGDIG – Signal Discrimination for Condition Monitoring A system for condition analysis and monitoring of industrial signals Collaborative research effort.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
Present By : Bahar Fatholapour M.Sc. Student in Information Technology Mazandaran University of Science and Technology Supervisor:
Introduction to Systems Analysis and Design
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Plenary Panel: Challenges towards the Global Adoption of Cloud Computing Chair: Vladimir Getov, University of Westminster Panelists: Stephen S. Yau, Arizona.
New Challenges in Cloud Datacenter Monitoring and Management
A Connected World in transformation NICE – DATACENTRES 2012 May 23 rd 2012 Paul-François CATTIER Global Data Centre Solution VP.
Automotive Warranty System 1.  Challenges faced by CIO  Our Solution  Our Methodology  Cloud Based Architecture  Clientele  Highly customizable.
Abstract Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement.
Effectively Explaining the Cloud to Your Colleagues.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Term Paper – CSC 557 “Contemporary Software Development Using Cloud Resources” By: Richard Appiah.
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
Cloud Computing in NASA Missions Dan Whorton CTO, Stinger Ghaffarian Technologies June 25, 2010 All material in RED will be updated.
Software Project Management With Usage of Metrics Candaş BOZKURT - Tekin MENTEŞ Delta Aerospace May 21, 2004.
Adaptive Virtual Machine Provisioning in Elastic Multi-tier Cloud Platforms Fan Zhang, Junwei Cao, Hong Cai James J. Mulcahy, Cheng Wu Tsinghua University,
Advanced SW/HW Optimization Techniques for Application Specific MCSoC m Yumiko Kimezawa Supervised by Prof. Ben Abderazek Graduate School of Computer.
Summer Report Xi He Golisano College of Computing and Information Sciences Rochester Institute of Technology Rochester, NY
High Performance Computing on Virtualized Environments Ganesh Thiagarajan Fall 2014 Instructor: Yuzhe(Richard) Tang Syracuse University.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Using SaaS and Cloud computing For “On Demand” E Learning Services Application to Navigation and Fishing Simulator Author Maha KHEMAJA, Nouha AMMARI, Fayssal.
Tel Aviv University - Industrial Engineering Department 1 Data Grid In Engineering TOC Grid Overview The PF5 definition: A very high-speed trans-European.
RIVERBED INTRODUCES NEW PLATFORM FOR ADC-AS-A-SERVICE New Stingray Services Controller Delivers Hyper-Elastic ADC Platform EXTREME ELASTICITY INSTANTLY.
Software Testing Definition Software Testing Module ( ) Dr. Samer Odeh Hanna.
Cloud Strategy made Simple David G. Fletcher. 2 Hybrid Cloud Approach Utah is building a private cloud to provision services from its virtualized infrastructure.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Define Cloud Computing
Amagees Tech Corp value added services Data Management and Infrastructure.
Advanced SW/HW Optimization Techniques for Application Specific MCSoC m Yumiko Kimezawa Supervised by Prof. Ben Abderazek Graduate School of Computer.
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
IT323 - Software Engineering 2 1 Tutorial 4.  List the main benefits of software reuse 2.
Presented by Lu Xiao Drexel University Quantifying Architectural Debt.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
V-Shaped Software Development Life Cycle Model. Introduction: Variation of water fall model. Same sequence structure as water fall model. Strong emphasis.
DevCOP: A Software Certificate Management System for Eclipse Mark Sherriff and Laurie Williams North Carolina State University ISSRE ’06 November 10, 2006.
Capacity Planning in a Virtual Environment Chris Chesley, Sr. Systems Engineer
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
LEADING FACET OF NETWORKING- CLOUD COMPUTING. Infrastructure provided by the service provider to build internet application. The service provided by cloud.
Innovative Partnership Solution-Driven Commitment Agile Value Sustainable.
CINI Presentation Stefano Russo University of Naples Federico II Naples, 20th December 2011.
Optimization of Resources in Clouds using Virtualization Department of Computer Science Punjabi University, Patiala Supervisor Name: Submitted By: Dr.
Unit 3 Virtualization.
Cloud Computing By P.Mahesh
Introduction to Cloud Computing
Cloud security issues & challenges – public cloud
Network Function Virtualization: Challenges and
Software Quality Engineering
The Graduate College Travel Summary Presentation
Cloud Consulting Services and Solutions
Cloud Computing: Concepts
Automated Analysis and Code Generation for Domain-Specific Models
Media & Entertainment Business challenge
New Trends in IoT: 5G, SDN, NFV and Slicing
Utilizing CI environment for efficient and effective testing of NFRs
Presentation transcript:

Ugo Giordano Tutor: Prof. Stefano Russo XXIX Cycle - I year presentation Cloud systems overload management

My Background I received my Master's Science Degree in Computer Engineering from University of Naples Federico II in I work within the Mobilab Research Group led by Prof. Stefano Russo 1-year Fellowship financed by PON Project “Display” of the public-private laboratory COSMIC I have previously collaborated with Selex ES (a Finmeccanica Company) and, now I’m collaborating in a project with Huawei Technologies (a Chinese TELCO equipment Company) Ugo Giordano 2

Software Defect Analysis Code and software defects analysis is crucial to improve the product quality and software development process. In this context, in collaboration with SELEX ES, I conducted an activity aimed to propose an approach to prioritize the most critical components and programming rules to correct for a cost-effective code sanitization. A possible future work plans to extend the proposed approach in the cloud computing environment, where Selex ES would like to move her software system in the near future. Ugo Giordano 3

Cloud advantages Cloud computing is certainly a powerful, transformational change in the information technology industry. The benefits are real, and quite substantial: – On-demand self-service. – Broad network access – Elastic scalability – Resource pooling – Rapid elasticity – Measured service Ugo Giordano 4

What is the problem? As suggested by many works in the literature, most of the cloud provider over-subscribe [8, 9, 11] their data center resources in order to improve the resource performance and utilization. Oversubscription is the act to offer more resource than there is actually capacity for under the assumption that most customers will not consume their entire portion. However, oversubscription brings the risk of resource overload. Ugo Giordano 5

NFV overload as a Case Study At the end of the first year I started to investigate what are the main techniques used to avoid overloading in cloud computing environment. In recent times, cloud computing is also used to achieve virtualization of network functionality (NFV). NFV is an initiative to virtualize network functions previously carried out by dedicated hardware. In the context of collaboration with Huawei, I recently started an analysis aimed at identifying possible solutions to the problem consider to overload occurs as a case study NFV. Ugo Giordano 6

Publications and References [1] Carrozza, G., Cinque, M., Giordano, U., Pietrantuono, P. & Russo, S. (2015). Prioritizing correction of static analysis infringements for cost-effective code sanitization. In Proceedings of the 2th International Workshop on Software Engineering Research and Industrial Practices (SER&IPs 2015). 37th “International Conference on Software Engineering” (ICSE 2015), Florence, May 16th to 24th. Ugo Giordano 7 [2] J. Zheng, L. Williams, N. Nagappan, W. Snipes, J. Hudepohl, and M. Vouk (2006). “On the value of static analysis for fault detection in software,” Software Engineering, IEEE Transactions on, vol. 32, no. 4, pp. 240– 253. [3] N. Nagappan and T. Ball (2005). “Static analysis tools as early indicators of pre-release defect density,” in Software Engineering, ICSE Proceedings. 27th International Conference on, pp. 580–586. [4] R. Plosch, H. Gruber, A. Hentschel, G. Pomberger, and S. Schiffer (2008). “On the relation between external software quality and static code analysis,” in Software Engineering Workshop, SEW ’08. 32nd Annual IEEE, pp. 169–174. [5] R. Pietrantuono, S. Russo, and K. Trivedi (2010). “Software reliability and testing time allocation: An architecture-based approach,” Software Engineering, IEEE Transactions on, vol. 36, no. 3, pp. 323–337. [6] G. Carrozza, R. Pietrantuono,and S. Russo (2014). “Defect analysis in mission – critical software systems: a detailed investigation,” J. Softw. Evol. and Proc., vol. 27, no. 1, pp. 22–49. [6] Huihua Lu; Kocaguneli, E.; Cukic, B. (2014). "Defect Prediction between Software Versions with Active Learning and Dimensionality Reduction," Software Reliability Engineering (ISSRE), 2014 IEEE 25th International Symposium o, vol., no., pp.312–322. [7] T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener (2010). “Defect prediction from static code features: current results, limitations, new approaches,” Automated Software Engineering, vol. 17, no. 4, pp. 375–407. [8] N. Bobroff, A. Kochut, and K. Beaty (2007). Dynamic placement of virtual machines for managing sla violations. In Integrated Network Management, IM ’07. 10th IFIP/IEEE International Symposium on, pages 119–128. [9] Meng, X., Isci, C., Kephart, J., Zhang, L., Bouillet, E. and Pendarakis, D. (2010). Efficient resource provisioning in compute clouds via vm multiplexing. In Proceedings of the 7th International Conference on Autonomic Computing, ICAC ’10, pages 11–20. [10] Wang, L., Hosn, R.A., Tang, C. (2012). Remediating overload in over-subscribed computing environments. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pages 860–867. [11] L. Tomas and J. Tordsson (2014). An autonomic approach to risk-aware data center overbooking. In Cloud Computing, IEEE Transactions on, pp. 292–305.

Next Years Ugo Giordano 8 Credits year 1 Credits year Y Y Estimated bimonth Summary Check Estimated bimonth Summary Check Modules Seminars Research During the second year, I will focus on the concept of virtualization function (NFV) and network infrastructure (SDN) in cloud architectures, with the objective to propose a possible solutions to the serious problem of overload, that the current interconnection networks are experiencing.

Thank you for your attention! Ugo Giordano 9