www.seminarsonly.com

 

 

Improving Utilization Of Infrastructure Clouds

Abstract

A key advantage of Infrastructure-as-a-Service (IaaS) clouds is providing users on-demand access to resources. However, to provide on-demand access, cloud providers must either significantly overprovision their infrastructure (and pay a high price for operating resources with low utilization) or reject a large proportion of user requests (in which case the access is no longer on-demand). At the same time, not all users require truly on-demand access to resources.

Many applications and workflows are designed for recoverable systems where interruptions in service are expected. For instance, many scientists utilize High Throughput Computing (HTC)-enabled resources, such as Condor, where jobs are dispatched to available resources and terminated when the resource is no longer available.

We propose a cloud infrastructure that combines on-demand allocation of resources with opportunistic provisioning of cycles from idle cloud nodes to other processes by deploying backfill Virtual Machines (VMs). For demonstration and experimental evaluation, we extend the Nimbus cloud computing toolkit to deploy backfill VMs on idle cloud nodes for processing an HTC workload.

Initial tests show an increase in IaaS cloud utilization from 37.5% to 100% during a portion of the evaluation trace but only 6.39% overhead cost for processing the HTC workload.

We demonstrate that a shared infrastructure between IaaS cloud providers and an HTC job management system can be highly beneficial to both the IaaS cloud provider and HTC users by increasing the utilization of the cloud infrastructure (thereby decreasing the overall cost) and contributing cycles that would otherwise be idle to processing HTC jobs

 

<< back

Related Projects : SMS Based Mobile Banking with Security ,SMS Based Student Intimation ,Social Networking With Advertisement ,Software Project Management ,SPAF: Stateless FSA-based Packet Filters ,Staying Connected in a Mobile Healthcare System ,Stealthy Attacks In Wireless Ad Hoc Networks ,Steganography In Audio Files ,Tanrox Work Force ,Text Encryption And Decryption ,Twitter Client For Android Based Smart Phone ,VAS for Hand Held Device ,Virtual Office Management ,Virtual Router Using Destination-Sequenced Distance Vector ,Voyage Management ,Web Enabled Automated Manufacturing System ,Web Alerts ,Web Blossom Bazzar ,Wireless Health Care System ,World Recipe ,Zeppelin Reservation

 

 

 
Copyright © V2computers 2006 through 2017