Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356064
Mi-yeon Hur, Myung-Sup Kim
The appearance of smart phones and their continuing rapid uptake has large affects on our society in as much as they represent a paradigm shift in the traditional industrial structure. The Telecom market is changing day by day, networks with the complicated and varied traffic have almost reached capacity because of the rapid increase of user and the service releases on smart phones. Therefore, the necessity for smart phone traffic monitoring and analysis has increased. Traffic analysis is an essential element for efficient and reliable networks. In this paper, we propose a new smart phone traffic classification by application method. The proposed method is composed of several consecutive steps: grouping the HTTP User-Agent field, extracting common strings by the LCS algorithm and finally classifying the traffic. In addition, to classify unknown traffic from previous methods, we propose a process that extracts header signatures in grouped information to improve the classification completeness. We achieved about a 90% accuracy rate for the analysis by our proposed method in the target campus network.
{"title":"Towards smart phone traffic classification","authors":"Mi-yeon Hur, Myung-Sup Kim","doi":"10.1109/APNOMS.2012.6356064","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356064","url":null,"abstract":"The appearance of smart phones and their continuing rapid uptake has large affects on our society in as much as they represent a paradigm shift in the traditional industrial structure. The Telecom market is changing day by day, networks with the complicated and varied traffic have almost reached capacity because of the rapid increase of user and the service releases on smart phones. Therefore, the necessity for smart phone traffic monitoring and analysis has increased. Traffic analysis is an essential element for efficient and reliable networks. In this paper, we propose a new smart phone traffic classification by application method. The proposed method is composed of several consecutive steps: grouping the HTTP User-Agent field, extracting common strings by the LCS algorithm and finally classifying the traffic. In addition, to classify unknown traffic from previous methods, we propose a process that extracts header signatures in grouped information to improve the classification completeness. We achieved about a 90% accuracy rate for the analysis by our proposed method in the target campus network.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356101
Seoyoung Kim, Hyejeong Kang, Yoonhee Kim
As computing technologies develop, various studies for e-Science have been actively developed for many years. The advent of Cloud computing, for example, enables scientists to expand their research environments over supercomputers to on-demand and scalable resources. However, several performance drawbacks on the cloud computing can cause considerable obstacles in scientific domains, despite its strong merits. A hybrid infrastructure which consists of the existing and cloud architecture thus can produce a synergy effect for utilizing resources efficiently. In this paper, we proposed hybrid infrastructure-supported a scientific workflow environment for Aerodynamics design and demonstrated its superiority. Hybrid infrastructure covers grid and private cloud computing in this paper. Especially, we focused on improving performance by supporting hybrid infrastructure and efficient usages of physical resources. Since it offers diverse types of computing infrastructures including cloud computing, it can serve elastic resources regardless of the number of tasks for experiments or limitations of space and can reduce costs of time as well as budget during simulations.
{"title":"A scientific workflow supported environment over hybrid infrastructure for aerodynamics design","authors":"Seoyoung Kim, Hyejeong Kang, Yoonhee Kim","doi":"10.1109/APNOMS.2012.6356101","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356101","url":null,"abstract":"As computing technologies develop, various studies for e-Science have been actively developed for many years. The advent of Cloud computing, for example, enables scientists to expand their research environments over supercomputers to on-demand and scalable resources. However, several performance drawbacks on the cloud computing can cause considerable obstacles in scientific domains, despite its strong merits. A hybrid infrastructure which consists of the existing and cloud architecture thus can produce a synergy effect for utilizing resources efficiently. In this paper, we proposed hybrid infrastructure-supported a scientific workflow environment for Aerodynamics design and demonstrated its superiority. Hybrid infrastructure covers grid and private cloud computing in this paper. Especially, we focused on improving performance by supporting hybrid infrastructure and efficient usages of physical resources. Since it offers diverse types of computing infrastructures including cloud computing, it can serve elastic resources regardless of the number of tasks for experiments or limitations of space and can reduce costs of time as well as budget during simulations.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117277759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356076
Shao-Chen Chang, Min-Huang Ku, Han-Ching Tsao, Teh-Sheng Huang
Because of the unique feature of platform-independent and the advantages of easy-to-develop and easy-to-deploy, Java-based applications are widely adopted by large-scale software-intensive information systems, and the monitoring-related functions in such environments are becoming more and more important. One single Application Server can deploy multiple instances of applications in Java EE environments, but the support of Application Server monitor tools does not evolve as the progress of Application Server itself. This paper will propose a new monitor architecture “Thread-based Monitor System Architecture (TMSA)”, which will exercise Thread-based technologies to detect and analyze the conditions of resource-leakage in Application Server, and proactively quarantine and terminate the potential abnormal resource-leakage processes, in order to increase the stability of the whole system dramatically.
{"title":"An architecture on proactive detecting, quarantining, and terminating resource leakage of Java-based applications","authors":"Shao-Chen Chang, Min-Huang Ku, Han-Ching Tsao, Teh-Sheng Huang","doi":"10.1109/APNOMS.2012.6356076","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356076","url":null,"abstract":"Because of the unique feature of platform-independent and the advantages of easy-to-develop and easy-to-deploy, Java-based applications are widely adopted by large-scale software-intensive information systems, and the monitoring-related functions in such environments are becoming more and more important. One single Application Server can deploy multiple instances of applications in Java EE environments, but the support of Application Server monitor tools does not evolve as the progress of Application Server itself. This paper will propose a new monitor architecture “Thread-based Monitor System Architecture (TMSA)”, which will exercise Thread-based technologies to detect and analyze the conditions of resource-leakage in Application Server, and proactively quarantine and terminate the potential abnormal resource-leakage processes, in order to increase the stability of the whole system dramatically.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134373520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356074
Jyh-Shyan Huang, Y. Lien, Chih-Lin Hu
When a catastrophic natural disaster occurs, the efficiency of disaster response operation is crucial to life saving. However, communication systems, such as cellular networks, were usually crashed due to various causes that made coordination difficult for many disorganized disaster response workers extremely. Unfortunately, rapid deployment of many existing emergency communication systems relies on a good transportation system, which is usually not available in a catastrophic natural disaster. We propose an emergency communication system, Contingency Cellular Network (CCN), by connecting disconnected base stations together with wireless links and portable power generators. CCN can support existing mobile phone users with limited capability. Such a system can support a large number of voluntary workers in the early hours of a catastrophic natural disaster, thus saving many lives. Design philosophy and high level system architecture of our framework are presented in this paper.
{"title":"Design of Contingency Cellular Network","authors":"Jyh-Shyan Huang, Y. Lien, Chih-Lin Hu","doi":"10.1109/APNOMS.2012.6356074","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356074","url":null,"abstract":"When a catastrophic natural disaster occurs, the efficiency of disaster response operation is crucial to life saving. However, communication systems, such as cellular networks, were usually crashed due to various causes that made coordination difficult for many disorganized disaster response workers extremely. Unfortunately, rapid deployment of many existing emergency communication systems relies on a good transportation system, which is usually not available in a catastrophic natural disaster. We propose an emergency communication system, Contingency Cellular Network (CCN), by connecting disconnected base stations together with wireless links and portable power generators. CCN can support existing mobile phone users with limited capability. Such a system can support a large number of voluntary workers in the early hours of a catastrophic natural disaster, thus saving many lives. Design philosophy and high level system architecture of our framework are presented in this paper.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134263931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356052
Jian Li, Jin Xiao, J. W. Hong, R. Boutaba
Vast majority of the services running on the smart phone today are networked in that significant amount of communication is required. Smart phone energy expenditure due to Wi-Fi communications constitutes significant portion of the battery discharge. In this paper, we first investigate the key factors influencing Wi-Fi energy consumption, and propose three energy management schemes: 1) Dynamic control of Wi-Fi on/off interface; 2) improve communication efficiency via application packing; and 3) elongation of Wi-Fi Power Save Mode (PSM) via application alignment under mixed application workload. We also design and test our solution as a device-side application utilizing general system process scheduling and network firewall techniques. As the result, our solution is easy to deploy, applicable to most mobile devices, and we explicitly tackle the challenging case of download management. Through extensive experimentation and solution prototyping, we show the effectiveness of device side Wi-Fi energy management and the importance of considering application characteristics.
{"title":"Application-centric Wi-Fi energy management on smart phone","authors":"Jian Li, Jin Xiao, J. W. Hong, R. Boutaba","doi":"10.1109/APNOMS.2012.6356052","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356052","url":null,"abstract":"Vast majority of the services running on the smart phone today are networked in that significant amount of communication is required. Smart phone energy expenditure due to Wi-Fi communications constitutes significant portion of the battery discharge. In this paper, we first investigate the key factors influencing Wi-Fi energy consumption, and propose three energy management schemes: 1) Dynamic control of Wi-Fi on/off interface; 2) improve communication efficiency via application packing; and 3) elongation of Wi-Fi Power Save Mode (PSM) via application alignment under mixed application workload. We also design and test our solution as a device-side application utilizing general system process scheduling and network firewall techniques. As the result, our solution is easy to deploy, applicable to most mobile devices, and we explicitly tackle the challenging case of download management. Through extensive experimentation and solution prototyping, we show the effectiveness of device side Wi-Fi energy management and the importance of considering application characteristics.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122183282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356072
Tetsuya Uchiumi, S. Kikuchi, Y. Matsumoto
Since many components comprising large scale cloud datacenters have a great number of configuration parameters (e.g. hostnames, languages, and time zones), it is difficult to keep consistencies in the configuration parameters. In such cases, misconfigured parameters can cause service failures. For this reason, we propose a misconfiguration detection method for large-scale cloud datacenters, which can automatically determine possible misconfigurations by identifying the relations existing among majority of the parameters using statistical decision tree analysis. We have also developed a pattern modification method to improve the accuracy of the decision tree approach. We evaluated the misconfiguration detection performance of the proposed method by using both artificial data and actual data. The results show that we can achieve higher accuracy (78.6% in the actual data) in misconfiguration detection by using the pattern modification.
{"title":"Misconfiguration detection for cloud datacenters using decision tree analysis","authors":"Tetsuya Uchiumi, S. Kikuchi, Y. Matsumoto","doi":"10.1109/APNOMS.2012.6356072","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356072","url":null,"abstract":"Since many components comprising large scale cloud datacenters have a great number of configuration parameters (e.g. hostnames, languages, and time zones), it is difficult to keep consistencies in the configuration parameters. In such cases, misconfigured parameters can cause service failures. For this reason, we propose a misconfiguration detection method for large-scale cloud datacenters, which can automatically determine possible misconfigurations by identifying the relations existing among majority of the parameters using statistical decision tree analysis. We have also developed a pattern modification method to improve the accuracy of the decision tree approach. We evaluated the misconfiguration detection performance of the proposed method by using both artificial data and actual data. The results show that we can achieve higher accuracy (78.6% in the actual data) in misconfiguration detection by using the pattern modification.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114240507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356058
Wunbae Jeon, H. Chong, Han-Wook Jung
M2M (Machine to machine) service has been designed to provide the customer with remote monitoring and control for various sensors and controllers. M2M platform is composed of a bunch of the software and devices equipped with network connectivity providing data manipulation and exchange among devices and applications. It is also required to be equipped with data management and analysis functions independent of the specific services. In this paper, it is proposed a highly scalable and flexible data exchange protocol, named UM3, which is independent to industry and products. The proposed UM3 data exchange protocols with data model and its encoding rules have strong interoperability to the various M2M related industry standards. UM3 data model based on ITU-T ASN.1 specification language has the capability of representing a time varying unstructured data format. The binary encoding rule of UM3 uses T-NL-N-L-V PDU format. It uses character string instead of numerical tag values as its attribute identifier. UM3 encoding rule provides XML and JSON encoding schemes as its text-based encoding methods. The merits of binary and text based encoding rules are more self-descriptive compared to numerical values based BER, XER and BACnet, etc. By the proposed in this paper self-descriptive capability and compatibility to the other industry protocols, integration of various M2M devices with different industry M2M platforms shall be more easer and expandable by modular way resulting general purpose M2M services. Finally, the pros and cons by character string based data exchange protocol and the future directions of M2M platform for different type of sensors and industry would be discussed and suggested.
{"title":"UM3 data exchange model and encoding rules","authors":"Wunbae Jeon, H. Chong, Han-Wook Jung","doi":"10.1109/APNOMS.2012.6356058","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356058","url":null,"abstract":"M2M (Machine to machine) service has been designed to provide the customer with remote monitoring and control for various sensors and controllers. M2M platform is composed of a bunch of the software and devices equipped with network connectivity providing data manipulation and exchange among devices and applications. It is also required to be equipped with data management and analysis functions independent of the specific services. In this paper, it is proposed a highly scalable and flexible data exchange protocol, named UM3, which is independent to industry and products. The proposed UM3 data exchange protocols with data model and its encoding rules have strong interoperability to the various M2M related industry standards. UM3 data model based on ITU-T ASN.1 specification language has the capability of representing a time varying unstructured data format. The binary encoding rule of UM3 uses T-NL-N-L-V PDU format. It uses character string instead of numerical tag values as its attribute identifier. UM3 encoding rule provides XML and JSON encoding schemes as its text-based encoding methods. The merits of binary and text based encoding rules are more self-descriptive compared to numerical values based BER, XER and BACnet, etc. By the proposed in this paper self-descriptive capability and compatibility to the other industry protocols, integration of various M2M devices with different industry M2M platforms shall be more easer and expandable by modular way resulting general purpose M2M services. Finally, the pros and cons by character string based data exchange protocol and the future directions of M2M platform for different type of sensors and industry would be discussed and suggested.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356102
Te-Chuan Chiu, Yuan-Yao Shih, Ai-Chun Pang, Jeu-Yih Jeng, P. Hsiu
Wireless charging technology is considered as one of the promising solutions to solve the energy limitation problem for large-scale wireless sensor networks. Obviously, charger deployment is a critical issue since the number of chargers would be limited by the network construction budget, which makes the full-coverage deployment of chargers infeasible. In many of the applications targeted by large-scale wireless sensor networks, end-devices are usually equipped by the human and their movement follows some degree of regularity. Therefore in this paper, we utilize this property to deploy chargers with partial coverage, with an objective to maximize the survival rate of end-devices. We prove this problem is NP-hard, and propose an algorithm to tackle it. The simulation results show that our proposed algorithm can significantly increase the survival rate of end-devices. To our knowledge, this is one of very first works that consider charger deployment with partial coverage in wireless rechargeable sensor networks.
{"title":"Mobility-aware charger deployment for wireless rechargeable sensor networks","authors":"Te-Chuan Chiu, Yuan-Yao Shih, Ai-Chun Pang, Jeu-Yih Jeng, P. Hsiu","doi":"10.1109/APNOMS.2012.6356102","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356102","url":null,"abstract":"Wireless charging technology is considered as one of the promising solutions to solve the energy limitation problem for large-scale wireless sensor networks. Obviously, charger deployment is a critical issue since the number of chargers would be limited by the network construction budget, which makes the full-coverage deployment of chargers infeasible. In many of the applications targeted by large-scale wireless sensor networks, end-devices are usually equipped by the human and their movement follows some degree of regularity. Therefore in this paper, we utilize this property to deploy chargers with partial coverage, with an objective to maximize the survival rate of end-devices. We prove this problem is NP-hard, and propose an algorithm to tackle it. The simulation results show that our proposed algorithm can significantly increase the survival rate of end-devices. To our knowledge, this is one of very first works that consider charger deployment with partial coverage in wireless rechargeable sensor networks.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356073
Xun Shao, G. Hasegawa, Y. Taniguchi, H. Nakano
Multihoming is widely used by Internet service providers (ISPs) to obtain improved performance and reliability when connecting to the Internet. Recently, the use of overlay routing for network application traffic is rapidly increasing. As a source of both routing oscillation and cost increases, overlay routing is known to bring challenges to ISPs. In this paper, we study the interaction between overlay routing and a multihomed ISP's routing strategy with a Nash game model, and propose a routing strategy for the multihomed ISP to alleviate the negative impact of overlay traffic.We prove that with the proposed routing strategy, the network routing game can always converge to a stable state, and the ISP can reduce costs to a relatively low level. From numerical simulations, we show the efficiency and convergence resulting from the proposed routing strategy. We also discuss the conditions under which the multihomed ISP can realize minimum cost by the proposed strategy.
{"title":"A game-theoretic analysis of interaction between overlay routing and multihoming","authors":"Xun Shao, G. Hasegawa, Y. Taniguchi, H. Nakano","doi":"10.1109/APNOMS.2012.6356073","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356073","url":null,"abstract":"Multihoming is widely used by Internet service providers (ISPs) to obtain improved performance and reliability when connecting to the Internet. Recently, the use of overlay routing for network application traffic is rapidly increasing. As a source of both routing oscillation and cost increases, overlay routing is known to bring challenges to ISPs. In this paper, we study the interaction between overlay routing and a multihomed ISP's routing strategy with a Nash game model, and propose a routing strategy for the multihomed ISP to alleviate the negative impact of overlay traffic.We prove that with the proposed routing strategy, the network routing game can always converge to a stable state, and the ISP can reduce costs to a relatively low level. From numerical simulations, we show the efficiency and convergence resulting from the proposed routing strategy. We also discuss the conditions under which the multihomed ISP can realize minimum cost by the proposed strategy.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-26DOI: 10.1109/APNOMS.2012.6356077
Lu Guan, Y. Wang, Yanfei Li
Reducing the number of active nodes is an natural and effective method in energy saving for large scale cloud datacenters. However, the traditional way of consolidating VMs by migration may lead to the impacts on performance as well as costs on power consumption and migration. In this paper, we propose an algorithm named DRAMDT to deploy VMs to servers without the use of migration, which groups VM instances by their deadline runtimes and pack VMs within the same group on the same servers. It is demonstrated in the experiments that DRAMDT is able to shut down more servers in time to save energy when user amount reduces. And the proposed algorithm has small searching space, low complexity and good scalability.
{"title":"A dynamic resource allocation method in IaaS based on deadline time","authors":"Lu Guan, Y. Wang, Yanfei Li","doi":"10.1109/APNOMS.2012.6356077","DOIUrl":"https://doi.org/10.1109/APNOMS.2012.6356077","url":null,"abstract":"Reducing the number of active nodes is an natural and effective method in energy saving for large scale cloud datacenters. However, the traditional way of consolidating VMs by migration may lead to the impacts on performance as well as costs on power consumption and migration. In this paper, we propose an algorithm named DRAMDT to deploy VMs to servers without the use of migration, which groups VM instances by their deadline runtimes and pack VMs within the same group on the same servers. It is demonstrated in the experiments that DRAMDT is able to shut down more servers in time to save energy when user amount reduces. And the proposed algorithm has small searching space, low complexity and good scalability.","PeriodicalId":385920,"journal":{"name":"2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}