Beyond the Clouds: How Should Next Generation Utility Computing Infrastructures Be Designed?

  • Marin Bertier
  • Frédéric Desprez
  • Gilles Fedak
  • Adrien Lebre
  • Anne-Cécile Orgerie
  • Jonathan Pastor
  • Flavien Quesnel
  • Jonathan Rouzaud-Cornabas
  • Cédric Tedeschi
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

To accommodate the ever-increasing demand for Utility Computing (UC) resources while taking into account both energy and economical issues, the current trend consists in building even larger data centers in a few strategic locations. Although, such an approach enables to cope with the actual demand while continuing to operate UC resources through centralized software system, it is far from delivering sustainable and efficient UC infrastructures. In this scenario, we claim that a disruptive change in UC infrastructures is required in the sense that UC resources should be managed differently, considering locality as a primary concern. To this aim, we propose to leverage any facilities available through the Internet in order to deliver widely distributed UC platforms that can better match the geographical dispersal of users as well as the unending resource demand. Critical to the emergence of such locality-based UC (LUC) platforms is the availability of appropriate operating mechanisms. We advocate the implementation of a unified system driving the use of resources at an unprecedented scale by turning a complex and diverse infrastructure into a collection of abstracted computing facilities that is both easy to operate and reliable. By deploying and using such a LUC Operating System on backbones, our ultimate vision is to make possible to host/operate a large part of the Internet by its internal structure itself: a scalable and nearly infinite set of resources delivered by any computing facilities forming the Internet, starting from the larger hubs operated by ISPs, governments, and academic institutions to any idle resources that may be provided by end users.

Keywords

Utility Computing UC Locality-based UC Distributed Cloud Computing IaaS Efficiency Sustainability 

References

  1. 1.
    Agha G (1986) Actors: a model of concurrent computation in distributed systems. MIT Press, CambridgeGoogle Scholar
  2. 2.
    Akka (2013) Build powerful concurrent & distributed applications more easily. http://www.akka.io. Accessed: March 2013
  3. 3.
    Andrew O (2003) Data networks are lightly utilized, and will stay that way. review of network economics. Rev Netw Econ 2(3):210–237MathSciNetGoogle Scholar
  4. 4.
    Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, ­Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRefGoogle Scholar
  5. 5.
    Bacon J, Evans D, Eyers DM, Migliavacca M, Pietzuch P, Shand B (2010) Enforcing end-to-end application security in the cloud (big ideas paper). In: Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Springer-Verlag, Berlin, Middleware’10, pp 293–312Google Scholar
  6. 6.
    Balouek D, Carpen Amarie A, Charrier G, Desprez F, Jeannot E, Jeanvoine E, Lèbre A, Margery D, Niclausse N, Nussbaum L et al (2013) Adding virtualization capabilities to the Grid’5000 testbed. In: Ivanov I, Sinderen M, Leymann F, Shan T (eds) Cloud computing and services science, Springer, BerlinGoogle Scholar
  7. 7.
    Balouek D, Lebre A, Quesnel F (2013) Flauncher and DVMS: deploying and scheduling thousands of virtual machines on hundreds of nodes distributed geographically. In: The sixth IEEE international scalable computing challenge (collocated with CCGRID), Delft, The NetherlandsGoogle Scholar
  8. 8.
    Benson T, Akella A, Maltz DA (2010) Network traffic characteristics of data centers in the wild. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, ACM, New York, IMC’10, pp 267–280Google Scholar
  9. 9.
    Blanc M, Briffaut J, Clevy L, Gros D, Rouzaud-Cornabas J, Toinard C, Venelle B (2013) Mandatory protection within clouds. In: Nepal S, Pathan M (eds) Security, privacy and trust in cloud systems, Springer, BerlinGoogle Scholar
  10. 10.
    Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing, ACM, New York, USA, MCC’12, pp 13–16Google Scholar
  11. 11.
    Buyya R, Ranjan R, Calheiros RN (2010) InterCloud: utility-oriented federation of cloud computing environments for scaling of application services. In: Proceedings of the 10th international conference on algorithms and architectures for parallel processing, Springer-Verlag, Berlin, ICA3PP’10, pp 13–31Google Scholar
  12. 12.
    Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper Syst Rev 36(SI):299–314CrossRefGoogle Scholar
  13. 13.
    Church K, Greenberg A, Hamilton J (2008) On delivering embarrassingly distributed cloud services. In: HotNetsGoogle Scholar
  14. 14.
    Dabek F, Cox R, Kaashoek MF, Morris R (2004) Vivaldi: a decentralized network coordinate system. In: Proceedings of the 2004 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM’04, pp 15–26Google Scholar
  15. 15.
    DeCandia G, Hastorun D, Jampani M, Kakulapati G, Lakshman A, Pilchin A, ­Sivasubramanian S, Vosshall P, Vogels W (2007) Dynamo: Amazon’s highly available key-value store. In: Proceedings of twenty-first ACM SIGOPS symposium on operating systems principles, ACM, SOSP’07, pp 205–220Google Scholar
  16. 16.
    Discovery (2013) Distributed VM scheduler. http://beyondtheclouds.github.io/DVMS/. ­Accessed: March 2013
  17. 17.
    CloudStack (2013) CloudStack, open source cloud computing. http://cloudstack.apache.org. Accessed: March 2013
  18. 18.
    Foster I (2011) Globus online: accelerating and democratizing science through cloud-based services. IEEE Internet Comput 15(3):70–73CrossRefGoogle Scholar
  19. 19.
    Foster I, Kesselman C (2011) The history of the grid. In: Foster I, Gentzsch W, Grandinetti L, Joubert GR (eds) Advances in parallel computing—volume 20: HPC: from grids and clouds to exascale. IOS Press, AmsterdamGoogle Scholar
  20. 20.
    Ganguly A, Agrawal A, Boykin PO, Figueiredo R (2006) IP over P2P: enabling self-configuring virtual IP networks for grid computing. In: Proceedings of the 20th international conference on Parallel and distributed processing, IEEE Computer Society, Washington, DC, USA, IPDPS’06Google Scholar
  21. 21.
    Gary Cook JVH (2013) How dirty is your data? Greenpeace International reportGoogle Scholar
  22. 22.
    Gerofi B, Ishikawa Y (2012) Enhancing TCP throughput of highly available virtual machines via speculative communication. In: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments, NY, USA, VEE’12Google Scholar
  23. 23.
    Gigaom Consortium (2012) Amazon outages—lessons learned. http://gigaom.com/cloud/amazon-outages-lessons-learned/. Accessed: 23 Feb. 2014
  24. 24.
    Greenberg A, Hamilton J, Maltz DA, Patel P (2008) The cost of a cloud: research problems in data center networks. SIGCOMM Comput Commun Rev 39(1):68–73CrossRefGoogle Scholar
  25. 25.
    Group IEW (2012) IEEE 802.3TM industry connections ethernet bandwidth assessmentGoogle Scholar
  26. 26.
    Hermenier F, Lawall J, Muller G (2013) BtrPlace: a flexible consolidation manager for highly available applications. IEEE Transactions on Dependable and Secure ComputingGoogle Scholar
  27. 27.
    Janiesch C, Matzner M, Muller O (2011) A blueprint for event-driven business activity management. In: Proceedings of the 9th international conference on business process management, Springer-Verlag, BPM’11, pp 17–28Google Scholar
  28. 28.
    Jin K, Miller EL (2009) The effectiveness of deduplication on virtual machine disk images. In: Proceedings of SYSTOR 2009: the Israeli Experimental Systems Conference, ACM, New York, USA, SYSTOR’09, pp 7:1–7:12Google Scholar
  29. 29.
    Lakshman A, Malik P (2010) Cassandra: a decentralized structured storage system. SIGOPS Oper Syst Rev 44(2):35–40CrossRefGoogle Scholar
  30. 30.
    Lefray A, Caron E, Rouzaud-Cornabas J, Zhang HY, Bousquet A, Briffaut J, Toinard C (2013) Security-aware models for clouds. In: Poster Session of IEEE Symposium on High Performance Distributed Computing (HPDC)Google Scholar
  31. 31.
    Liu J, Goraczko M, James S, Belady C, Lu J, Whitehouse K (2011) The data furnace: heating up with cloud computing. In: Proceedings of the 3rd USENIX conference on hot topics in cloud computing, HotCloud’11Google Scholar
  32. 32.
    Lowe S (2011) Mastering VMware vSphere. Wiley: IndianapolisGoogle Scholar
  33. 33.
    Mao M, Humphrey M (2012) A performance study on the VM startup time in the cloud. In: Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, IEEE Computer Society, CLOUD’12, pp 423–430Google Scholar
  34. 34.
    Miller KW, Voas J, Laplante P (2010) In trust we trust. Computer 43:85–87CrossRefGoogle Scholar
  35. 35.
    Moreno-Vozmediano R, Montero R, Llorente I (2012) IaaS cloud architecture: from virtualized datacenters to federated cloud infrastructures. Computer 45(12):65–72CrossRefGoogle Scholar
  36. 36.
    Morin C (2007) XtreemOS: a grid operating system making your computer ready for participating in virtual organizations. In: Proceedings of the 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing, IEEE Computer Society, ISORC’07, pp 393–402Google Scholar
  37. 37.
    Murray P, Sefidcon A, Steinert R, Fusenig V, Carapinha J (2012) Cloud networking: an infrastructure service architecture for the wide area. HP Labs Tech Report-HPL-2012–111R1Google Scholar
  38. 38.
    Nicolae B, Bresnahan J, Keahey K, Antoniu G (2011) Going back and forth: efficient multideployment and multisnapshotting on clouds. In: Proceedings of the 20th international symposium on High performance distributed computing, ACM, New York, USA, HPDC’11, pp 147–158Google Scholar
  39. 39.
    Nimbus (2013) Nimbus is cloud computing for science. http://www.nimbusproject.org. ­Accessed: March 2013
  40. 40.
    OpenNebula (2013) Open source data center virtualization. http://www.opennebula.org. ­Accessed: March 2013
  41. 41.
    OpenStack (2013) The open source, open standards cloud. http://www.openstack.org. ­Accessed: March 2013
  42. 42.
    Peng C, Kim M, Zhang Z, Lei H (2012) VDN: virtual machine image distribution network for cloud data centers. In: INFOCOM, 2012, pp 181–189Google Scholar
  43. 43.
    Petrovic D, Schiper A (2012) Implementing virtual machine replication: a case study using Xen and Kvm. In: Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications, pp 73–80Google Scholar
  44. 44.
    Pfaff B, Pettit J, Koponen T, Amidon K, Casado M, Shenker S (2009) Extending networking into the virtualization layer. In: ACM HotNetsGoogle Scholar
  45. 45.
    Pierre G, Stratan C (2012) ConPaaS: a platform for hosting elastic cloud applications. IEEE Internet Comput 16(5):88–92CrossRefGoogle Scholar
  46. 46.
    Quesnel F, Lebre A, Sudholt M (2012) Cooperative and reactive scheduling in large-scale virtualized platforms with DVMS. Concurr Comput Pract Exp 25(12):1643–1655CrossRefGoogle Scholar
  47. 47.
    Rajagopalan S, Cully B, O’Connor R, Warfield A (2012) SecondSite: disaster tolerance as a service. In: Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution Environments, ACM, VEE’12, pp 97–108Google Scholar
  48. 48.
    Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: SIGCOMM’01: Proceedings of the conference on applications, technologies, architectures, and protocols for computer communications, ACM, New York, USA, SIGCOMM’01, pp 161–172Google Scholar
  49. 49.
    Rochwerger B, Breitgand D, Levy E, Galis A, Nagin K, Llorente IM, Montero R, Wolfsthal Y, Elmroth E, Caceres J, Ben-Yehuda M, Emmerich W, Galan F (2009) The reservoir model and architecture for open federated cloud computing. IBM J Res Dev 53(4):4:1–4:11CrossRefGoogle Scholar
  50. 50.
    Sail Consortium (2012) Scalable and adaptive internet solutions—European Project FP7 program. http://www.sail-project.eu. Accessed: March 2014
  51. 51.
    Sandhu R, Boppana R, Krishnan R, Reich J, Wolff T, Zachry J (2010) Towards a discipline of mission-aware cloud computing. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop, pp 13–18Google Scholar
  52. 52.
    Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, ACM, New York, USA, SIGCOMM’01, pp 149–160Google Scholar
  53. 53.
    Tan T, Simmonds R, Arlt B, Arlitt M, Walker B (2008) Image management in a virtualized data center. SIGMETRICS Perform Eval Rev 36(2):4–9CrossRefGoogle Scholar
  54. 54.
    Tang C (2011) FVD: a high-performance virtual machine image format for cloud. In: ­Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIX Association, USENIXATC’11Google Scholar
  55. 55.
    Zhao H, Yu Z, Tiwari S, Mao X, Lee K, Wolinsky D, Li X, Figueiredo R (2012) CloudBay: enabling an online resource market place for open clouds. In: Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, UCC’12Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Marin Bertier
    • 1
  • Frédéric Desprez
    • 1
  • Gilles Fedak
    • 1
  • Adrien Lebre
    • 1
  • Anne-Cécile Orgerie
    • 1
  • Jonathan Pastor
    • 1
  • Flavien Quesnel
    • 1
  • Jonathan Rouzaud-Cornabas
    • 1
  • Cédric Tedeschi
    • 1
  1. 1.InriaCampus universitaire de BeaulieuRennesFrance

Personalised recommendations