Resource Protection in Enterprise Data Centers: Architectures and Protocols. (Protection de ressources dans des centres de données d'entreprise: Architectures et Protocoles)

نویسنده

  • Yesid Jarma
چکیده

During the last few years, the rise of the Internet has changed the way business is conducted worldwide. To remain competitive, businesses have been implementing information technology support for business processes over the years. In this context, Service Oriented Architectures (SOA) have emerged as the main solution for the integration of legacy systems with new technologies within large organizations. Modern Enterprise Data Centers (EDCs) implementing SOA concepts and solutions are usually deployed as a two-tiered architecture where, in order to relieve service servers from the computational cost of CPU intensive tasks (e.g., XML parsing) and to perform resource protection, these functions are offloaded on a cluster of SON (Service-Oriented Networking) appliances. In EDC setups, access to services is governed by Service-Level Agreements (SLAs), which aim at protecting EDC resources. Currently, SON appliances are able to protect EDC resources by limiting the access (i.e., controlling the traffic) to services. Resource provisioning and optimization is a classic QoS management problem. Moreover, traffic control is a well-known problem in network traffic engineering. However, in service-oriented EDC setups the problem is fundamentally different. In classic networks, the resource protected by the shaping function is typically link bandwidth and buffer space, the units of which are precisely defined and measurable. In an EDC environment, resource metrics mostly fall into one of the following types : CPU power and main memory from application servers (CPU and memory), disk storage from storage servers (disk), and link bandwidth on the internal EDC network (bandwidth). Another fundamental difference is that in “classic” networks traffic control has local scope, since traffic is in the form of a single connection. In an EDC environment, service clients access services from multiple entry points (e.g., a cluster of SON appliances). Thus, the desired effect is “global” shaping. The challenge is then to enforce contracts by taking local actions at each entry point. The contributions of these thesis are threefold. We first propose and validate DOWSS, a dynamic credit-based algorithm formultipoint-to-point service traffic shaping. Contrary to existing credit-based approaches, DOWSS involves the use of a

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ProFlex: A Probabilistic and Flexible Data Storage Protocol for Heterogeneous Wireless Sensor Networks

This paper presents ProFlex, a proactive data distribution protocol for heterogeneous wireless sensor networks (HWSNs). ProFlex guarantees robustness in data retrieval by intelligently managing data replication among selected storage nodes in the network. Contrarily to related protocols in the literature, ProFlex considers the resource constraints of sensor nodes and constructs multiple data re...

متن کامل

A Technical Review of Real-Time QoS Protocols for Wireless Sensor Networks

Real-time wireless sensor networks become more and more important in emerging new applications as message delivery timeliness is highly concerned. However, supporting real-time QoS in sensor networks has faced many challenges due to their wireless nature, limited resource, dynamic network topology, and the demand of distributed architecture. There are tradeoffs between different application req...

متن کامل

Performances de protocoles transactionnels en environnement mobile

RÉSUMÉ. L’omniprésence d’unités mobiles et le développement des réseaux sans fil motivent des avancées en matière de supports d’exécution pour une grande variété d’applications en environnement mobile. Des efforts importants sont faits pour offrir une bonne gestion des données malgré les caractéristiques limitées de tels environnements. La notion de transaction a été réétudiée pour proposer des...

متن کامل

ثبت اختراعات دارویی و بررسی چالش های حقوقی آن

La protection des produits pharmaceutiques par le droit des brevets est aujourd’hui un sujet brûlant, notamment en raison du progrès spectaculaire que connaît depuis quelques années le domaine de la biotechnologie. En générale, les brevets pharmaceutiques sont nécessaires pour stimuler la recherche de nouveaux médicaments plus efficace...

متن کامل

Étude sur les portails et agrégateurs des ressources pédagogiques universitaires francophones en accès libre

A ces trois grands objectifs stratégiques, deux autres objectifs (ou exigences) d'ordre technologique et culturel sont également à prévoir dans la construction d'un portail francophone commun de ressources pédagogiques gratuites : 1. D'abord, une exigence technique (et technologique) de convergence et de cohérence avec les pratiques internationales dans la conception et la diffusion des ressour...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012