A Method for Measuring Energy Consumption in IaaS Cloud
نویسندگان
چکیده مقاله:
The ability to measure the energy consumed by cloud infrastructure is a crucial step towards the development of energy efficiency policies in the cloud infrastructure. There are hardware-based and software-based methods of measuring energy usage in cloud infrastructure. However, most hardware-based energy measurement methods measure the energy consumed system-wide - including the energy lost in transit. In an environment such as the cloud, where energy consumption can be a result of different components, it is important to isolate the energy, which is consumed as a result of executing application workloads. This information can be crucial in making decisions such as workload consolidation. In this paper, we propose an experimental approach of measuring power consumption as a result of executing application workloads in IaaS cloud. This approach is based on Intel’s Running Average Power Limit (RAPL) interface. Application workload is obtained from Phoronix Test Suite (PTS)’ 7zip and aio-stress. To demonstrate the feasibility of this approach, we have described an approach, which can be used to study the effect of workload consolidation on CPU and I/O's power performance by varying the number of Virtual Machines (VMs) . Power is measured in watts. Performance of CPU is measured in Million Instructions per Second (MIPS) and I/O performance (as a result of processing data intensive) is measured in MB/s. Our results on the effect of workload consolidation has been compared with previous research and was found to be consistent. This shows that the proposed method of measuring power consumption is accurate.
منابع مشابه
economic optimization and energy consumption in tray dryers
دراین پروژه به بررسی مدل سازی خشک کردن مواد غذایی با استفاده از هوای خشک در خشک کن آزمایشگاهی نوع سینی دار پرداخته شده است. برای آنالیز انتقال رطوبت در طی خشک شدن به طریق جابجایی، یک مدل لایه نازک برای انتقال رطوبت، مبتنی بر معادله نفوذ فیک در نظر گفته شده است که شامل انتقال همزمان جرم و انرژی بین فاز جامد و گاز می باشد. پروفایل دما و رطوبت برای سه نوع ماده غذایی شامل سیب زمینی، سیب و موز در طی...
15 صفحه اولManaging Risk in a Derivative IaaS Cloud
Infrastructure-as-a-Service (IaaS) cloud platforms rent computing resources with different cost and availability tradeoffs. For example, users may acquire virtual machines (VMs) in the spot market that are cheap, but can be unilaterally terminated by the cloud operator. Because of this revocation risk, spot servers have been conventionally used for delay and risk tolerant batch jobs. In this pa...
متن کاملMeasuring Energy Consumption of a Database Cluster
Energy consumption of database servers is a growing concern for companies as it is a critical part of a data center’s cost. To address the rising cost and the waste of energy, a new paradigm called GreenIT arose. Hardware and software developers are aiming at more energy-efficient systems. To improve the energy footprint of database servers, we developed a cluster of small-scale nodes, that can...
متن کاملProvenance Framework for the Cloud Environment (IaaS)
Cloud providers can optimize resource utilization and energy consumption by finding patterns in their usage. One way of finding such patterns is to study the history of Cloud resources activity. This approach is known as Cloud provenance. Provenance can also be used to track errors and faults in Cloud services. We have developed a provenance framework for research Clouds in order to find the hi...
متن کاملBehavior Based IDS for Cloud IaaS
Cloud Computing provides many types of services mainly SaaS, PaaS, IaaS. Each of them have their own security challenges, but IaaS undertakes all types of challenges viz., network attack and request based attacks i.e. handling the requests from untrusted users, XSS (cross site scripting attack), DDOS and many more. These attacks are independent of each other and consequently the QoS provided by...
متن کاملSecurity checklist for IaaS cloud deployments
In this article, we provide a cloud-security checklist for IaaS cloud deployments. The elements of the checklist are established by surveying the related literature on cloud-threat models and various security recommendations. We define the elements of the list on a level of abstraction that helps keep the size of the list manageable while preserving the lists practical applicability.
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 6 شماره 3
صفحات 141- 150
تاریخ انتشار 2020-08-01
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023