Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

LAYSI: A layered approach for SLA-violation propagation in self-manageable cloud infrastructures

Brandic, I and Emeakaroha, VC and Maurer, M and Dustdar, S and Acs, S and Kertesz, A and Kecskemeti, G (2010) LAYSI: A layered approach for SLA-violation propagation in self-manageable cloud infrastructures. In: 2010 IEEE 34th Annual Computer Software and Applications Conference . pp. 365-370. (2010 IEEE 34th Annual Computer Software and Applications Conference, 19th-23rd July 2010, Seoul).

[img] Text
LAYSI_Brandic_CloudApp2010.pdf - Accepted Version

Download (251kB)

Abstract

Cloud computing represents a promising comput ing paradigm where computing resources have to be allocated to software for their execution. Self-manageable Cloud in frastructures are required to achieve that level of flexibility on one hand, and to comply to users' requirements speci fied by means of Service Level Agreements (SLAs) on the other. Such infrastructures should automatically respond to changing component, workload, and environmental conditions minimizing user interactions with the system and preventing violations of agreed SLAs. However, identification of sources responsible for the possible SLA violation and the decision about the reactive actions necessary to prevent SLA violation is far from trivial. First, in this paper we present a novel approach for mapping low-level resource metrics to SLA parameters necessary for the identification of failure sources. Second, we devise a layered Cloud architecture for the bottom-up propagation of failures to the layer, which can react to sensed SLA violation threats. Moreover, we present a communication model for the propagation of SLA violation threats to the appropriate layer of the Cloud infrastructure, which includes negotiators, brokers, and automatic service deployer. © 2010 IEEE.

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science
Publisher: IEEE
Date Deposited: 04 Aug 2016 13:41
Last Modified: 04 Aug 2016 13:41
DOI or Identification number: 10.1109/COMPSACW.2010.70
URI: http://researchonline.ljmu.ac.uk/id/eprint/3995

Actions (login required)

View Item View Item