Authors: Konstantinos Kostantos; Dimosthenis Kyriazis; Marinos Themistocleous
Addresses: Department of Digital Systems, University of Piraeus, 80, Karaoli and Dimitriou Str, 18534 Piraeus, Greece ' Department of Digital Systems, University of Piraeus, 80, Karaoli and Dimitriou Str, 18534 Piraeus, Greece ' Department of Digital Systems, University of Piraeus, 80, Karaoli and Dimitriou Str, 18534 Piraeus, Greece
Abstract: Many applications, especially the ones implementing multimedia streaming, fall within the context of real-time systems in which only small deviations from timing constraints are allowed. The advancements in distributed computing have made it possible to follow a service-oriented approach, taking advantage of the benefits this provides. Cloud computing is a paradigm that aims to transform computer, storage and network resources into a utility. As more applications are deployed on cloud environments, one of the main requirements refers to real time event management during the application execution. In this paper, we present two mechanisms that aim at addressing this requirement: an adaptable two layer monitoring mechanism which generates appropriate events and an event processing framework to consume these events. We evaluate the effectiveness of these mechanisms through a set of experiments on a large scale multi-cloud facility. The latter poses challenges with respect to time-constrained execution of applications, since the aforementioned mechanisms need to collect and analyse information from geographically distributed sites, and trigger scaling decisions during the real-time application execution. The experimentation outcomes demonstrate the value of the presented mechanisms, both in terms of efficient scalability and with respect to the introduced overhead on the infrastructure.
Keywords: quality of service; QoS; event management; workflow management; monitoring; scaling; cloud computing; real-time systems; event processing; cloud services.
International Journal of High Performance Computing and Networking, 2015 Vol.8 No.3, pp.212 - 221
Available online: 18 Aug 2015 *Full-text access for editors Access for subscribers Purchase this article Comment on this article