Replicating Virtualized Database Servers

  • Liang Zhao
  • Sherif Sakr
  • Anna Liu
  • Athman Bouguettaya
Chapter

Abstract

In general, virtualization technology is increasingly being used to improve the manageability of software systems and lower their total cost of ownership. Resource virtualization technologies add a flexible and programmable layer of software between applications and the resources used by these applications. One among several approaches for deploying data-intensive applications in cloud platforms, called the virtualized database servers approach, takes advantage of virtualization technologies by taking an existing application designed for a conventional data center, and then porting it to run on virtual machines in the public cloud. Such migration process usually requires minimal changes in the architecture or the code of the deployed application. In this approach, database servers, like any other software components, are migrated to run in virtual machines. One of the main advantages of this approach is that the application can have full control in dynamically allocating and configuring the physical resources of the database tier as needed. Hence, software applications can fully utilize the elasticity feature of the cloud environment to achieve their defined and customized scalability or cost reduction goals. In addition, this approach enables the software applications to build their geographically distributed database clusters. Without the cloud, building such in-house cluster would require self-owned infrastructure which represent an option that can be only afforded by big enterprises.

Keywords

Virtual Machine Cloud Environment Public Cloud Physical Machine Clock Synchronization 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
  2. 42.
    RUBiS: Rice University Bidding System. http://rubis.ow2.org/.
  3. 49.
    TPC-W: a transactional web e-Commerce benchmark. http://www.tpc.org/tpcw/.
  4. 199.
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ’09, pages 199–212, Chicago, IL, USA, November 2009. ACM.Google Scholar
  5. 208.
    Jörg Schad, Jens Dittrich, and Jorge-Arnulfo Quiané-Ruiz. Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proc. VLDB Endow., 3(1–2):460–471, September 2010.Google Scholar
  6. 210.
    Will Sobel, Shanti Subramanyam, Akara Sucharitakul, Jimmy Nguyen, Hubert Wong, Arthur Klepchukov, Sheetal Patil, Armando Fox, and David Patterson. Cloudstone: Multi-platform, multi-language benchmark and measurement tools for web 2.0. In Proceedings of the 1st Workshop on Cloud Computing and Its Applications, CCA ’08, Chicago, IL, USA, October 2008.Google Scholar
  7. 242.
    Liang Zhao, Sherif Sakr, and Anna Liu. Application-managed replication controller for cloud-hosted databases. In Proceedings of the 5th IEEE International Conference on Cloud Computing, CLOUD ’12, pages 922–929, Washington, DC, USA, 2012. IEEE Computer Society.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Liang Zhao
    • 1
  • Sherif Sakr
    • 2
    • 3
  • Anna Liu
    • 4
  • Athman Bouguettaya
    • 5
  1. 1.NICTAKensingtonAustralia
  2. 2.Software Systems Research Group NICTAEveleighAustralia
  3. 3.Faculty of Computers and InformationCairo UniversityGizaEgypt
  4. 4.NICTAEveleighAustralia
  5. 5.School of Computer Science and Information TechnologyRMIT UniversityMelbourneAustralia

Personalised recommendations