Professional Documents
Culture Documents
Abstract
Cloud computing has emerged as a new and alternative
method for providing computing services. As cloud size
increases, the probability that all workloads
simultaneously scale up to their required services. This
inspection agrees to multiplex cloud resources among
numerous workloads, significantly humanizing resource
use. The capability of host virtualized workloads such
that available physical capacity is smaller than the sum
of maximal demands of the workloads is passing on to as
over-commit or over-subscription. Elasticity is one of
the characteristic of cloud computing that improves the
flexibility for clients and it permits them to adjust the
quantity of physical resources associated to their
services over time in an on-demand basis. However,
elasticity makes troubles for cloud providers as it may
lead to poor resource utilization, especially in
combination with other reasons, such as user
overestimations and pre-defined VM sizes. Use the
elastic key feature in VM cloud environments and
Estimating the resource allocation to design the self
adapting system. By implementing distributed PID
controller that changes the level of risk in data centers.
Keywords: Resource Utilization,
elasticity, cloud computing
virtualization,
2. Related work
1. Introduction
In the recent past years, academic and scientific entities
as well as some companies owned huge mainframes,
clusters, or yet supercomputers that have to be shared
across their users for satisfying their computing
requirements. Since they were exclusive machines, the
resources having essentially into account performance
metrics: throughput, response time, load-balancing, etc.
Nowadays, more and more distributed applications are
being provided in the Cloud as a composition of
virtualized services. For example, in an IaaS, each
service is deployed as a set of virtualized components,
i.e. Virtual Machines (VMs) that are activated according
www.ijete.org
www.ijete.org
4. Automated optimization in VM
This level represents the risk aware admission controller.
If the service is rejected by admission controller, risk
aware controller analyze the capacity and passed to
fuzzy assessment and compare with risk threshold values
and collocate VM based on service request capacity.
This algorithm is used to find a suitable server for task
scheduling and calculate the fairness values to the
Overbooking. Summarize over all running tasks capacity
in VM environments. Evaluates the risk associated to the
new incoming request by calling the fuzzy risk
assessment module. Calculate the acceptance risk and
the data center risk thresholds. Resource allocation is
used to assign the available resources in an economic
way. Resource allocation may be decided by using
computer programs applied to a specific domain to
automatically and dynamically distribute resources to
applicants. User sends the request to the admission
controller. The request may be resource request or file
request. Admission controller analyzes the demands for
user requests. Knowledge DB get data center behavior
that is CPU, Memory and IO Utilization also analyze
available running tasks and idle tasks, then calculate VM
execution time and memory. Admission controller
makes decision, whether it is accepted or not. If the
service is accepted, request is sent to overbooking
scheduler to analyze horizontal elasticity in virtual
machines. If service is rejected, request is sent to risk
assessment controller to analyze capacity of VM. Based
on these following parameters, decision is made. Req CPU, memory, and I/O capacity required by the new
incoming service. UnReq - the difference between total
data center capacity and the capacity requested by all
running services. Free - the difference between total data
center capacity and the capacity used by all running
services. The fuzzy assessment analyzes the risk
threshold values and PID controller finds error values
about machine status. Contains following errors such as
present error (P), the accumulated error (I), and the
prediction of future errors (D). Implement the collocated
VM concept to merging two or more predefined VMs.
Algorithm:
Input: A CPU utilization history
Output: A decision on whether to migrate a VM
1: if the CPU utilization history size > Tl then
2: Convert the last CPU utilization value to a state
5. Conclusion
Resource allocation models in cloud computing
infrastructures tend to allow large fractions of resources
to sit idle at any given time. Overbooking has proven to
increase data center utilization. However, it may impact
applications performance, in addition to other
unexpected events, such as flash crowds or resource
failures that may aggravate the situation. Adapting to
capacity changes has become an important problem,
210
www.ijete.org
Reference
[1] A. Ali-Eldin, J. Tordsson, and E. Elmroth, An
adaptive hybrid elasticity controller for cloud
infrastructures, in Proc. of Network Operations and
Management Symposium (NOMS), 2012, pp. 204212.
[2] A. Sulistio, K. H. Kim, and R. Buyya, Managing
cancellations and no-shows of reservations with
overbooking to increase resource revenue, in Proc. of
Intl. Symposium on Cluster Computing and the Grid
(CCGrid), 2008, pp. 267276.
[3] L. Tomas and J. Tordsson, Improving Cloud
Infrastructure Utilization through Overbooking, in
Proc. of ACM Cloud and Autonomic Computing
Conference (CAC), 2013.
[4] Cloudy with a chance of load spikes: Admission
control with fuzzy risk assessments, in Proc. of 6th
IEEE/ACM Intl. Conference on Utility and Cloud
Computing, 2013, pp. 155162.
[5] K. J. A strom and R. M. Murray, Feedback
Systems: An Introduction for Scientists and Engineers.
Princeton University Press, 2008.
[6] T.-F. Chen and J.-L. Baer, Effective hardware-based
data prefetching for high-performance processors, IEEE
Transactions on Computers, vol. 44, no. 5, pp. 609623,
1995.
[7] J. Flich, S. Rodrigo, J. Duato, T. Sodring, A.
Solheim, T. Skeie, and O. Lysne, On the potential of
noc virtualization for multicore chips, in Proc. of Intl.
Conference on Complex, Intelligent and Software
Intensive Systems (CISIS), 2008, pp. 801807.
[8] J. Duato, A new theory of deadlock-free adaptive
routing in wormhole networks, IEEE Transactions on
Parallel and Distributed Systems, vol. 4, no. 12, pp.
13201331, 1993.
[9] B. B. Chen and P.-B. Primet, Scheduling deadlineconstrained bulk data transfers to minimize network
congestion, in Proc. of IEEE 7th Intl. Symposium on
Cluster Computing and the Grid (CCGRID), 2007, pp.
410417.
[10] A. J. Bernstein and J. C. Sharp, A policy-driven
scheduler for a time-sharing system, Communications
of the ACM, vol. 14, no. 2, pp. 7478, 1971.
211
www.ijete.org