Immediate download Cloud Computing Principles Systems and Applications 2nd Edition Nick Antonopoulos ebooks 2024
Immediate download Cloud Computing Principles Systems and Applications 2nd Edition Nick Antonopoulos ebooks 2024
com
https://textbookfull.com/product/cloud-computing-principles-
systems-and-applications-2nd-edition-nick-antonopoulos/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/cloud-computing-and-big-data-
technologies-applications-and-security-mostapha-zbakh/
textboxfull.com
https://textbookfull.com/product/federal-cloud-computing-the-
definitive-guide-for-cloud-service-providers-2nd-edition-matthew-
metheny/
textboxfull.com
https://textbookfull.com/product/project-management-systems-
principles-and-applications-badiru/
textboxfull.com
https://textbookfull.com/product/virology-principles-and-
applications-2nd-edition-unknown/
textboxfull.com
Cloud Computing CLOUD 2018 Min Luo
https://textbookfull.com/product/cloud-computing-cloud-2018-min-luo/
textboxfull.com
https://textbookfull.com/product/energy-systems-modeling-principles-
and-applications-hooman-farzaneh/
textboxfull.com
https://textbookfull.com/product/effective-medium-theory-principles-
and-applications-2nd-edition-choy/
textboxfull.com
https://textbookfull.com/product/assured-cloud-computing-first-
edition-campbell/
textboxfull.com
https://textbookfull.com/product/mastering-bitcoin-unlocking-digital-
cryptocurrencies-2nd-edition-andreas-m-antonopoulos/
textboxfull.com
Computer Communications and Networks
Nick Antonopoulos
Lee Gillam Editors
Cloud
Computing
Principles, Systems and Applications
Second Edition
Computer Communications and Networks
Series editor
A.J. Sammes
Centre for Forensic Computing
Cranfield University, Shrivenham Campus
Swindon, UK
The Computer Communications and Networks series is a range of textbooks,
monographs and handbooks. It sets out to provide students, researchers, and non-
specialists alike with a sure grounding in current knowledge, together with com-
prehensible access to the latest developments in computer communications and
networking.
Emphasis is placed on clear and explanatory styles that support a tutorial
approach, so that even the most complex of topics is presented in a lucid and
intelligible manner.
Cloud Computing
Principles, Systems and Applications
Second Edition
123
Editors
Nick Antonopoulos Lee Gillam
University of Derby University of Surrey
Derby, Derbyshire, UK Guildford, Surrey, UK
Since the first version of this book was published in 2010, with a foreword by my
colleague Mark Baker (University of Reading), considerable developments have
taken place in Cloud computing. Today, Cloud computing is no longer a niche
research area but now closely embedded in our everyday computing environment.
This is the ultimate success of a technology, which initially starts out as a specialist
domain-specific interest, but becomes so successful that it becomes invisible to us as
users. Systems such as Dropbox, Apple iCloud, Microsoft Office 365 and Google
Drive (amongst many others) are now regularly made use of and considered very
much a core fabric of our computing infrastructure. Social media platforms such
as Facebook, Twitter and Instagram all make use of Cloud systems and make use
of novel concepts such as “eventual consistency” (amongst others) as part of their
implementation. A mobile app that does not make use of a Cloud-based back end is
now an anomaly rather than a norm, a considerable change that has taken place since
2010. Early scientific Cloud systems, such as Eucalyptus, Open Cirrus, etc., once
considered the domain of computer science research, are now regularly used within
a variety of other communities, from biological sciences to arts and humanities.
Figure 1 shows change in interest (via Google trends) for the three terms “Cloud
computing” (dashed line, descending), “Internet of Things” (dashed line, slowly
ascending) and “big data” (dotted line) since the first edition of this book was
published in 2010. These three trends are closely related, as many applications
that generate or process large data sizes make use of Cloud-based infrastructure.
Similarly, many IoT devices act as data generators or consumers. It is also
interesting to see that programming models such as MapReduce, featured in the
2010 book, also appear in this version of the book but with a specific focus
on a dynamic Cloud computing environment. This programming model has now
been implemented across a variety of systems, from Hadoop (Cloudera, Apache)
to in-memory systems such as Apache Spark and Mesos (amongst others). This
programming model demonstrates how Cloud computing mechanisms have also
transformed data analysis and processing and has found wide-scale adoption in
industry and academia.
v
vi Foreword
Fig. 1 Google trends for Cloud computing, Internet of Things and big data
The significant growth and capability of edge devices, and how these can be
combined with Cloud-based data centres, has also seen considerable interest over
recent years. In 2010, edge devices generally comprising of sensors were primarily
used as mechanism for data capture. With increasing advances in semiconductor
technologies, edge devices today have significant processing capability (e.g. the use
of Arduino, Raspberry Pi 3, Intel Edison, etc.) enabling data to be preprocessed and
sampled at the network edge, prior to being transmitted to a centralised data centre.
Another significant trend since 2010 has been the wider adoption and availability of
programmable networks through software-defined networks and network function
virtualisation technologies. The availability of a more complex capability at the
network edge, along with in-network programmability, changes the role of a data
centre. This perspective requires researchers to better understand how edge devices
and data centres can be used collectively. Understanding what should be done
at the network edge vs. in the data centre becomes an important consideration.
In 2010, a key requirement was to understand how processing and data could
be “offloaded” from a mobile/edge device to a Cloud data centre (to conserve
battery power of the edge device and avoid the impact of intermittent network
connectivity). Today the focus has shifted to “reverse offloading”, i.e. understanding
how processing to be carried out within a Cloud data centre could be shifted to
edge devices – to limit large data transfer over a public network and avoid latency
due to such transfers. Better and more effective use of edge devices (alongside
the use of a data centre) also leads to useful ways of supporting data security
(i.e. a user can decide what should remain on the devices vs. what to shift to the
data centre). The programming models needed to support this collaborative and
opportunistic use of edge devices and data centres remain in short supply at present.
Recent availability of low-overhead (in terms of memory/storage requirements and
scheduling delay) “container” technologies (such as Docker, Kubernetes, Red Hat
OpenShift) also provides useful mechanisms for supporting edge device/Cloud data
centre integration, enabling services to be migrated (offloaded) from edge devices
to data centres (and vice versa) – Villari et al.1 refer to this as “osmotic computing”.
Virtualisation technologies have also seen a considerable improvement since
2010. The capability to virtualise various parts of our computing infrastructure
(from processors, networks, edge devices, storage, etc.) and services (such as a
firewall) has seen considerable growth. The “virtualised enterprise” vision now
dominates thinking in many resource management systems, aiming to make more
effective use of resources across different applications. Understanding how the
memory requirements and switching overhead of virtual machines (VMs) could be
1
M. Villari, M. Fazio, S. Dustdar, O. Rana and R. Ranjan, “Osmotic Computing: A New Paradigm
for Edge/Cloud Integration”, IEEE Cloud Computing, December 2016. IEEE Computer Society
Press.
viii Foreword
reduced has led to interest in container technologies. Some predict that the days
of VM-based deployments are limited, due to benefits observed with containers.
How such approaches can be made multiplatform and support federation remain
important challenges in this context.
The editors of this book have selected an excellent combination of chapters that
cover these emerging themes in Cloud computing – from autonomic resource man-
agement, energy efficiency within such systems and new application requirements
of such technologies. The book will provide valuable reference material for both
academic researchers and those in industry to better gauge current state of the art in
Cloud-based systems.
1. Introduction
The first edition of this book, back in 2010, started by identifying the relatively
recent emergence of Cloud and the increasing demand for Cloud systems and
services that was apparent. We suggested, back then, that its meaning was hotly
debated and identified specific IT and e-commerce vendors – Amazon, Google,
IBM, Microsoft and Sun – who seemed to be leading the charge in making pay-per-
use access to a wide variety of third-party applications and computational resources
on a massive scale available widely. We also identified how the notion of Clouds
seems to blur the distinctions between grid services, web services and data centres.
In the time that has elapsed between the first edition and this second edition,
it would be fair to say that Cloud has not only emerged but has become a go-
to for both experimental and developmental uses and is variously at the core of
numerous businesses across the globe. For some, the use of Cloud in many of
their activities is either second nature or is otherwise unavoidable. The definitional
debates at a broad level have subsided, with a purportedly final perspective – at the
16th version – offered by the US National Institute of Standards and Technology
(The NIST Definition of Cloud Computing, NIST Special Publication 800–145).2
This is completed by the subsequent production in 2014 of ISO/IEC 17788, Cloud
computing – Overview and vocabulary, although these two are not perfectly aligned,
as well as ISO/IEC 17789, Cloud computing – Reference architecture. Of the
five vendors we had acknowledged before, four remain and would probably now
be considered the biggest Cloud players at this point in time, not least because
their reported Cloud revenues are now in the billions of dollars per quarter: Sun’s
Network.com which had originally appeared to be a well-timed foray is, for most
and perhaps unfortunately, a slightly distant memory following Sun’s acquisition by
2
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf – doi:10.6028/
NIST.SP.800–145.
ix
x Preface
Oracle, with the memory of Sun as a company becoming equally distant. And for
these big four, not only is the scale of their Cloud operations substantial, as it needs
to be, but the range of services now available is also substantial and growing. And in
terms of blurred distinctions, Cloud variously supports or subsumes these – running
in, and across, multiple data centres in a large number of geographical jurisdictions
and supporting grid, web and mobile services amongst others.
As the subject has grown, so topic coverage has extended. Many new Cloud-
based services are a commoditisation of decreasingly common computational needs,
albeit with a few with broad application. Given the inherent economies of scale
brought to such commoditisation, this is likely to put further pressure on companies
that are (still) trying to compete in Cloud. And, indeed, this has already led to
some companies who have tried to compete withdrawing their attempts to keep
pace and in one particular large company case closing down their public Cloud
entirely. Various reasons may be cited: one key reason will be the sheer scale of
investment needed to address the inherently high costs of building and running
large new data centres and of continuing to ensure these comprise the latest and
most capable hardware within a highly competitive pricing environment. The result,
of not being able to compete at this level, tends to be that the arena for competition
shifts up the stack, with consultancies and commentators of various hues espousing
the benefits to be gained using multiple, and potentially federated, Clouds (multi-
Cloud). This also adds opportunities in Cloud brokerage, in adding value or getting
the best performance per unit of cost, and also in Cloud orchestration, with the need
to simplify the complexities of using a multiplicity of services simultaneously. And
the continued focus on Cloud security shows no sign of abating at any time soon.
Cloud is also, arguably, the springboard for the emergence of various other
significant topics of interest. The scale of storage and computational capability
available supports the treatment of big data, not only of large static collections but
also of the kinds of streaming sensor data important in the Internet of Things and the
combination of big and streaming data. In turn, Cloud acts as an enabler for activities
in so-called smart cities and in supporting operation of connected and autonomous
vehicles. And although software, platform and infrastructure remain the mainstay of
service models, these also now address containers (e.g. with Docker in Amazon’s
Elastic Container Service, Microsoft Container Service, Google Container Engine
and IBM Containers) and microservices (AWS Lambda, Microsoft Azure Functions,
Google Cloud Functions and IBM OpenWhisk); the latter abstracts away from the
lower levels of the stack, as well as offering pricing based on compute time used
as multiples of milliseconds rather than hours. With the relative maturity of such
offerings, as well as the emergent next generations of mobile telecommunications
related to network function virtualisation and mobile edge Cloud computing,
increased focus on distributed computation and computational offloading may also
be anticipated.
Given the extent described above, any collection such as this can only ever offer
insights into select subsets of what exists – as, indeed, have the paragraphs above.
Research around these areas abounds and will continue to grow, with the growth
Preface xi
in number and diversity of Cloud conferences and workshops and special issues
of very many journals that are variously Cloud flavoured, as a crude but effective
measure of reach, coverage and scope. However, the four cornerstones of quality of
service, embodied in the first edition, remain consistent:
1. Efficiency: The need for execution and coordination of the services to be
optimised in terms of data traffic and latency remains, even with lower-latency
communications, in part due to growth of data and ability to process it. Data
traffic is typically one of the main cost factors in any distributed computing
framework, and thus its reduction is a standard long-term goal of such systems.
Latency is arguably one of the most important factors affecting customer
satisfaction, and therefore it should also be within specified acceptable limits.
And efficiencies in performance per unit cost are of particular importance.
2. Scalability: Cloud service offerings of various kinds continue to need to scale
well to support massive customer bases. They must continue to withstand
demand of a great many bursty applications during peak times and endure the
“flash crowd” phenomenon familiar in overly successful marketing strategies and
provisioning for popular websites at key times. There is evidence to suggest, also,
that great scale can dissipate distributed denial of service attacks, albeit at a price.
However, applications must also be architected to be able to operate at scale.
3. Robustness: Cloud services still need continuously high availability by design,
with effective use of redundancy and graceful failover. With users charged for
the expected successful use of computational facilities, it remains imperative
to understand and address the risk of failure, either to help to mitigate the
probability of failure or to use this information to offer appropriate compensation
schemes. Some high-profile Cloud users are known to make deliberate efforts to
disrupt their own systems in order to prove to themselves that any impact on the
services is minimised, which again relates to appropriate architecting.
4. Security: Appropriate security provisions are now, quite simply, a fundamental
expectation for both data and applications to protect both the providers and
consumers from malicious or fraudulent activities and must recognise the
responsibilities of each with respect to the other.
In respect to various Cloud topics, this edition carries the following key
objectives:
1. To present and explore the principles, techniques, protocols and algorithms that
are used to design, develop and manage Clouds
2. To present current Cloud applications and highlight the use of Cloud technologies
to manage data and scientific analysis
3. To present methods for linking Clouds and optimising their performance
All three objectives are firmly rooted in extant discourse of distributed computing
and a desire to understand the potential of all these technologies in constructing
purpose-specific Cloud solutions that successfully address commercial demand and
shape successful business.
xii Preface
2. Expected Audience
3. Book Overview
The book contains 14 chapters that were carefully selected based on peer review
by at least two expert and independent reviewers. The chapters are split into five
parts:
This part aims to cover the essential technical characteristics and concepts behind
the new developments in Cloud computing. The chapters included in this part
collectively introduce the reader to essential architectural principles behind the
new developments and how these advances are influencing the applications, how
Preface xiii
This part builds on the principles and approaches of Part I and provides an in-
depth coverage of how Clouds can be designed to produce scientific insights and
analysis. This part describes important aspects of scientific applications such as
agility, reproducibility, consistency and scalability. It includes chapters that propose
novel techniques and systems for making Clouds reproducible, agile and consistent.
Chapter 4 introduces elasticity, which helps in determining the most appropriate
set of resources for running scientific applications whose requirements cannot be
determined in advance. It describes elasticity taxonomy and how this can be used
in running scientific applications. A discussion about good practices as well as an
analysis of the state of the art is described.
Chapter 5 characterises terms and requirements related to scientific repro-
ducibility. Clouds can play a key role by offering the infrastructure for long-term
preservation of programmes and data. This chapter describes how Clouds can aid
the development and selection of reproducibility approaches in science.
Chapter 6 describes the challenges in integrating clinical and genomic data
and producing insights from it. Integration complexity, data inconsistency and
scalability of the underlying data infrastructures have been highlighted as the main
challenges. Cloud approaches to storing huge amounts of clinical and genomic data
and producing value from it are also described.
xiv Preface
This part presents ideas on achieving federation and interoperability across Clouds
and using autonomic computing and other intelligent approaches to self-manage the
federated Clouds. It includes chapters that propose novel techniques and systems
for making Cloud data and application interoperable as well as achieving data and
compute interoperability through automated means.
Chapter 9 presents an architecture to facilitate federated Clouds for achieving
interoperability between Clouds, especially application and data-level interoperabil-
ity. It describes the design of the architecture, implementation choices and some
practical evaluations for monitoring multiple Cloud deployments to make informed
decisions.
Chapter 10 provides an overview of the concepts that are being used in practice
and theory in order to advance the field of self-managing and self-healing Clouds.
It describes approaches to providing self-managed data- and compute-intensive
services to the users by overcoming heterogeneity in terms of computing resources.
This part covers a range of challenging issues associated to Cloud data centres
that, if not addressed properly, may limit its adoption. It includes chapters on
Preface xv
Cloud operations and Cloud economy offering approaches that can bring down
Cloud operation costs. It also includes chapters on resource management approaches
leading to energy efficiency and predictive workload management.
Chapter 11 presents a Cloud brokering model, which can reduce Cloud cus-
tomers’ costs when compared to traditional on-demand renting costs. It proposes
a number of online and offline heuristics to efficiently manage the resources of
the broker in order to optimise its revenue, as well as the QoS level offered to the
customers.
Chapter 12 proposes a resource management model with the aim of improv-
ing energy efficiency and reliability. The model manages the problem of over-
provisioning of resources and to an underutilisation of the active servers. Using
an evolutionary optimisation algorithm, the model can efficiently map user requests
with the available hardware resources.
Chapter 13 describes an approach to manage Cloud data centres by observing
workload behaviours and server usage patterns in the past. The analysis presented
in this chapter can support Cloud providers for achieving efficient data centre
management and prediction analytics in Cloud data centres.
Chapter 14 presents energy-efficient browsing approach that ranks URL and
web domains based on web page-induced energy consumption. The approach can
achieve substantial resource reduction for CPU and memory usage. It is also able to
reduce bandwidth usage without any degradation to user experience.
Acknowledgements
The editors are grateful to the peer review panel for supporting this book including
Miyuru Dayarathna, Daniel de Oliveira, Vincent C. Emeakaroha, Teodor-Florin
Fortiş, Imen Ben Fradj, Luiz Manoel Rocha Gadelha Júnior, Guilherme Galante,
Santiago Iturriaga, Sara Kadry, Somnath Mazumdar, Bhaskar Prasad Rimal, José
Simão and Domenico Talia.
The editors are also grateful to their respective families for continuing to afford
them the time to produce works such as this.
The editors wish to thank Springer’s team for their strong and continuous support
throughout the development of this book.
The editors are also deeply apologetic to anyone that they may have forgotten.
xvii
Contents
xix
xx Contents
Part IV Multi-clouds
9 Facilitating Cloud Federation Management via Data
Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Vincent C. Emeakaroha, Phillip Healy, and John P. Morrison
10 Applying Self-* Principles in Heterogeneous Cloud Environments . . . 255
Ioan Drăgan, Teodor-Florin Fortiş, Gabriel Iuhasz, Marian Neagul,
and Dana Petcu
1.1 Introduction
In 2009, Rimal et al. [1] published a very first taxonomy and survey that defined the
field, described many issues and opportunities, and summarized the developments of
cloud computing up to that point. We refer readers to our original paper [1] to better
understand the fundamentals of cloud computing and the descriptions of potential
applications. Since then, the role and scope of cloud computing has remarkably
changed. In this chapter, our aim is a complement to that taxonomy and survey,
denoting the rapid technological advancements since then. Cloud computing has
been widely deployed and become a major backbone of every other technology –
from cellular phones through to wearables, connected vehicles, and the future
networked society. The networked society is the networks of everything (NoE), that
is, beyond the upcoming 5G networks.
Our vision of networked society is not only about wired/wireless communica-
tions but creating an ecosystem of device vendors, application developers, network
operators, telecom operators, and cloud services/infrastructure providers to create
a foreseeable new business value chain that will not only accelerate every area
but also bring new innovative ideas and services. Those services are accessible
to anyone (e.g., devices, human, robots, automobiles) to connect each other and
share data from anywhere and anytime. However, there is still no well-defined
standard definition and requirements of the networked society. Therefore, there is
Cloud computing implements the idea of utility computing, which was first coined
by Professor John McCarthy in 1961, where computing was viewed as a public
utility just as the telephone system. Later, this idea resurfaced in new forms as
cloud computing. There is a plethora of definitions for cloud computing, from both
academia and industry. Among them, Rimal et al. [2] defined cloud computing as,
a model of service delivery and access where dynamically scalable and virtualized
resources are provided as a service over the Internet. Cloud computing provides
a paradigm shift of business and IT, where computing power, data storage, and
1 The Rise of Cloud Computing in the Era of Emerging Networked Society 5
1
SalesForce: https://www.salesforce.com/, Accessed Nov. 2016.
2
NetSuite: http://www.netsuite.com/, Accessed Nov. 2016.
3
Oracle: https://www.oracle.com/cloud/saas.html, Accessed Nov. 2016.
4
IBM: https://www.ibm.com/cloud-computing/solutions/, Accessed Nov. 2016.
5
Microsoft Office 365: https://products.office.com/en-us/office-online/documents-spreadsheets-
presentations-office-online, Accessed Nov. 2016.
6 B.P. Rimal and I. Lumb
PaaS are Google AppEngine6 and Microsoft Azure,7 just to name two. PaaS can
slash development time and offer hundreds of readily available tools and services
compared to conventional application development.
(3) Infrastructure-as-a-Service (IaaS): IaaS is the delivery of resources (e.g.,
processing, storage, networks) as a service over Internet. Aside from the higher
flexibility, a key benefit of IaaS is the usage-based payment scheme. This allows
customers to pay as you grow. Key examples are Amazon EC2,8 GoGrid,9 Flexis-
cale,10 Layered Technologies,11 AppNexus,12 Joyent,13 and Mosso/Rackspace.14
(1) Public Cloud: It describes the cloud computing in the traditional mainstream
sense, whereby resources are dynamically provisioned on a fine-grained, self-
service basis over the Internet, via web applications/web services, from an off-site
third-party provider who shares resources. Some examples are Zimory,15 Microsoft
Azure, Amazon EC2, GigaSpaces,16 Rackspace, and Flexiscale.17
(2) Private Cloud: Data and processes are managed within the organization
without the restrictions of network bandwidth, security exposures, and legal require-
ments that using public cloud services across open, public networks might entail.
Some examples are Amazon VPC,18 Eucalyptus,19 OpenStack,20 VMWare,21 and
Intalio.22
6
Google AppEngine: https://console.cloud.google.com/projectselector/appengine, Accessed Nov.
2016.
7
Microsoft Azure: https://azure.microsoft.com/en-us/?b=16.26, Accessed Nov. 2016.
8
Amazon EC2: https://aws.amazon.com/ec2/, Accessed Nov. 2016.
9
GoGrid: https://www.datapipe.com/gogrid/, Accessed Nov. 2016.
10
Flexiscale: http://www.flexiscale.com/, Accessed Nov. 2016.
11
Layered Technologies: https://www.datapipe.com/layered_tech/, Accessed Nov. 2016.
12
AppNexus: https://www.appnexus.com/en/platform, Accessed Nov. 2016.
13
Joyent: https://www.joyent.com/, Accessed Nov. 2016.
14
Mosso/Rackspace: https://www.rackspace.com/cloud, Accessed Nov. 2016.
15
Zimory: http://www.zimory.com/, Accessed Nov. 2016.
16
GigaSpaces: http://www.gigaspaces.com/HP, Accessed Nov. 2016.
17
Flexiscale: http://www.flexiscale.com/, Accessed Nov. 2016.
18
Amazon VPC: https://aws.amazon.com/vpc/, Accessed Nov. 2016.
19
Eucalyptus: http://www8.hp.com/us/en/cloud/helion-eucalyptus.html, Accessed Nov. 2016.
20
OpenStack: https://www.openstack.org/, Accessed Nov. 2016.
21
VMWare: https://www.vmware.com/, Accessed Nov. 2016.
22
Intalio: http://www.intalio.com/, Accessed Nov. 2016.
1 The Rise of Cloud Computing in the Era of Emerging Networked Society 7
(3) Hybrid Cloud: The environment is consisting of multiple internal and/or exter-
nal providers. Some examples are RightScale,23 Asigra Hybrid Cloud Backup,24
QTS,25 and Skytap.26
Jony is 65 years old and medically paralyzed man. One day Jony feels sick and asks personal
assistant robot to call the hospital. The personal assistant robot then calls the hospital emer-
gency number and requests further assistance. The hospital authority then sends self-driving
car to Jony’s home. The personal assistant robot puts Jony into the self-driving car. Then the
self-driving car takes him to the hospital. On the way to hospital doctors were monitoring
Jony’s health status remotely. At the hospital, a specialist doctor performs remote surgery
with actuating robots to save his life.
Fig. 1.1 Hypothetical scenario of the next generation of cloud computing: connecting everything
from everywhere via cloud in the networked society
23
http://www.rightscale.com/, Accessed Nov. 2016.
24
Asigra: http://www.asigra.com/cloud-backup-software, Accessed Nov. 2016.
25
http://www.qtsdatacenters.com/, Accessed Nov. 2016.
26
https://www.skytap.com/, Accessed Nov. 2016.
8 B.P. Rimal and I. Lumb
Cloud Computing
Augmented,Virtual,
Enabling Technologies and Mixed Reality
Containerization
for
Networked Society
Tactile Internet
Network Slicing
Network Function
Software-Defined
Virtualization (NFV)
Networking (SDN) 4G LTE/LTE-Advanced,
5G networks
in a cloudlet host. The client then establishes an HTTP connection to the cloudlet
server for VM overlay27 transmission and uploads the overlay [8–10]. The cloudlet
decompresses this overlay and applies it to the baseVM to derive the launchVM and
then creates a VM instance from it. Afterward, the mobile client starts offloading
operation on that instance. The mobile device uses Wi-Fi or cellular data service of
4G LTE depending on the deployment scenarios of cloudlet to reach Internet and
then remote cloud (e.g., Amazon EC2).
Cloudlet supports resource-intensive and interactive mobile applications by
providing computing resources to mobile devices with low latency. Key features of
cloudlets include near-real-time, just-in-time provisioning of applications to edge
nodes and handoff of virtual machines seamlessly from one node to another once a
user has moved away from its first node.
Potential application areas of cloudlet are enormous. More specifically, the appli-
cations (e.g., video streaming, speech processing, cognitive assistance applications,
augmented and virtual reality, edge analytics in IoT, new automotive services, drone,
just to name a few) which have stringent QoS requirements, such as low latency and
real time, can all benefit from cloudlets.
Fog Computing: Cisco envisioned the concept of Fog computing in 2012. Fog
computing is a highly virtualized platform, which extends the cloud computing
to the edge of networks, thereby enabling applications and services on billions of
connected devices, especially, in the Internet of Things (IoT) [11]. Example includes
Cisco IOx that combines IoT application execution within the fog computing and
offers highly secure connectivity with Cisco IOS technology. Some of the major
characteristics of Fog computing are listed below:
• Fog nodes (i.e., provide compute, storage, and network capabilities) are typically
located away from the main cloud data centers.
• Fog nodes provide applications with awareness of device geographical location
and device context.
• Fog nodes offer special services that may only be required in the IoT context
(e.g., translation between IP and non-IP transport).
• Support for online analytics and interplay with the cloud
Fog computing may have a wide range of applications such as connected vehicle,
smart grid, smart cities, pipeline monitoring, connected rail, smart traffic light sys-
tems, machine-to-machine (M2M) communications, or human-machine interaction
(HMI), just to name a few.
Mobile-Edge Computing: The European Telecommunications Standards Institute
(ETSI) launched an industry specification for mobile-edge computing (MEC) in
September 2014. The ETSI defined MEC as: Mobile-edge Computing transforms
27
The compressed binary difference between the baseVM (i.e., a VM with a minimally configured
guest operating system installed) image and the launchVM (i.e., VM image used for offloading)
image is known a VM overlay [8, 9].
10 B.P. Rimal and I. Lumb
base stations (e.g., 2G/3G/4G/5G) into intelligent service hubs that are capable
of delivering highly personalized services (IT and cloud computing capabilities)
directly from the very edge of the network within the radio access network (RAN)
while providing the best possible performance in mobile networks [12]. Some
typical use cases of MEC are as follows:
• Intelligent video acceleration service
• Active location-aware application services
• Video stream analysis and video delivery optimization using data caching
• Augmented and virtual reality services
• RAN intelligence for customer experience
• Mobile PBX for large enterprises
• Connected vehicles and IoT gateway services
Examples of some leading MEC solution providers include the Vasona Smart
AIR platform, Saguna Open-RAN, Brocade MEC Platform Services, Nokia Liquid
Radio Applications Cloud Server, and Intel’s Network Edge Virtualization (NEV)
SDK MEC application and services.
The major components of the ETSI-MEC architecture [13] are summarized in
Table 1.1.
Internet of Things: The Internet of Things (IoT) is the network of networks where
billions of devices/objects connect to each other and create new opportunities and
challenges. IoT ecosystem includes any type of devices/technology (smartphones,
connected cars, wearables, robots, vertical applications) that can connect to the
Internet. The International Telecommunication Union (ITU) Telecommunication
Table 1.1 The major components and its functionalities of the ETSI-MEC reference architecture
Components Description
Mobile-edge Sets the policy and configuration rules (e.g., traffic rules) for forwarding user
platform plane traffic to MEC applications. It also provides a set of services and access
to persistent storage
Mobile-edge Maintains an overall view of the deployed mobile-edge hosts, validates
orchestrator applications rules and requirements, and selects appropriate mobile-edge hosts
for instantiating a MEC application
Mobile-edge Responsible for life cycle management of applications and provides element
platform management functions to the mobile-edge platform
manager
Virtualized Responsible for managing, allocating, and releasing the resources of the
infrastructure virtualized infrastructure and also does rapid provisioning of applications
manager
Mobile-edge Runs on the top of the virtualized infrastructure provided by the mobile-edge
applications host and also interacts with mobile-edge platform to provide services
1 The Rise of Cloud Computing in the Era of Emerging Networked Society 11
28
Actors are external to the IoT and interact with the IoT.
Exploring the Variety of Random
Documents with Different Content
jetzt als praktisch bewährte Einrichtungen erfand — bedeutende sind
und der unzählige Male mit Wort und Schrift für dasselbe begeistert
und viele Andere begeisternd eintrat und wahrhaft unermüdlich
wirkte. Es ist dies der Kaufmann und Turngeräthefabrikant Herr
Oswald Faber in Leipzig,[2] dessen Bild als Zugführer der
Turnerfeuerwehr wir auf dem Titelblatt und im Text unsres Heftes VI
bringen. In wahrhafter Bescheidenheit hat er sich stets allen
Ovationen für seine Thätigkeit entzogen, ihm gebührt ein Ehrenplatz
in dieser Chronik unsres Leipzigs.
[1] Nach Oswald Fabers »Die freiwilligen Feuerwehren,« 3.
Auflage.
[2] Mit seiner Concurrenzarbeit »Ueber Organisation von Dorf-
Feuerwehren« mit der großen silbernen Medaille der k. k.
österreich. Regierung prämirt im Juli 1870 auf dem 8. deutschen
Feuerwehrtag zu Linz.
C. Die Rettungscompagnie.
Die Leipziger freiwillige Rettungscompagnie, welche neben der
städtischen und der Turnerfeuerwehr bestand, rekrutirte sich aus
Leipziger Bürgern und Einwohnern von den besten
Gesellschaftsklassen herab bis zum Arbeiterstande. Ein sehr großer
Theil derselben waren ebenfalls noch aktive oder doch frühere
Turner. Die Compagnie, deren Zusammensetzung, Ziele u. s. w. so
ziemlich dieselben waren, wie die der Turnerfeuerwehr, wich an der
Bekleidung insofern von der Turnerfeuerwehr ab, als sie dunklere,
schwarzgraue Blousen mit dem auf die Brustseite angestepptem R.
C. trug. Obwohl die Mitglieder derselben ebenfalls zum Spritzen- und
Steigerdienst vollständig ausgebildet waren und ihre eigene vom
Rath beschaffte Spritze besaßen, war ihr Augenmerk doch in erster
Linie, wie schon ihr Name sagt, auf das Rettungswerk von Personen
und beweglichem Besitzthum gerichtet. Die Rettungscompagnie,
welche eine Stärke von etwa 100 Mann besaß, wechselte mit der
Turnerfeuerwehr behufs Besetzung der Wache im Brühl dergestalt
ab, daß sie, nachdem die 15 tägigen Wachtposten der
Turnerfeuerwehr beendet waren, ihrerseits nun während 9 Tagen die
Wache besetzte, worauf wieder der Turnus der ersteren begann.
Auch die Rettungscompagnie nahm an der Tilgung aller Brände
während der Zeit ihres Bestehens mit gleicher Bravour und großer
Pflichttreue und Erfolg Theil und hielt — kleine Häkeleien dann und
wann ausgenommen — mit der Turnerfeuerwehr treue
Kameradschaft. Aber dieselben Gründe, welche schon 1871 eine
freiwillige Auflösung der Turnerfeuerwehr herbeiführten, führten auch
obwohl mehr als ein Jahrzehnt später ihre freiwillige Auflösung
herbei. Dieselbe erfolgte am 31. Dezember 1886. Bei dem
Abschiedscommers im alten Schützenhause am Abend des 31.
December wurde die gesammte Mannschaft zur Tilgung eines
größeren Feuers nach Reudnitz commandirt. Commandanten der
Rettungscompagnie waren nach einander:
Kaufmann Rudolf Gruner (s. Bericht an den Rath vom
5. August 1842).
Advokat (späterer Stadtrath) Schilling vom 5. April 1851
(ausgetreten am 1. Februar 1862).
Eisengießereibesitzer Gustav Götz vom 12. Februar 1862
(ausgetreten am 17. Februar 1870).
Kaufmann Hermann Meister, vom 23. Februar 1870; (vom
1. Juni 1875 städt. Branddirektor).
Zimmermeister Aug. Kersten (vom 5. Juni 1875, gest. im
August 1883).
Baumeister W. Rob. Rost (vom 12. Oktober 1883 bis zur
Auflösung der Compagnie am 31. Dezember 1886).
Beide Corporationen wurden vielen Hunderten freiwilliger
Feuerwehren in ganz Deutschland zum Vorbild, sie nahmen unter
allen derselben den ältesten und berechtigsten Vorrang ein und
wenn jetzt noch das — namentlich für kleinere und mittlere
Gemeinden von so außerordentlich wichtigen, werthvollen und mit
verhältnißmäßig geringem Kostenaufwande verbunden — freiwillige
Feuerlöschwesen in so hoher Blüthe steht, so fällt ein guter Theil
des Bewußtseins, wesentlich hierzu beigetragen zu haben, auf die
ehemalige freiwillige Feuerwehr zu Leipzig.
XXXIII.
Auf der Wache der Turnerfeuerwehr.
Das Wachtlokal der Turnerfeuerwehr und Rettungscompagnie
befand sich bis zur Auflösung beider Corporationen im Brühl, Ecke
der Göthestraße, damalige städt. Fleischhallen und zwar in
ursprünglich zum Verkaufsgewölbe eingerichteten Räumen. Groß
war dasselbe nicht und von übermäßigem Comfort war darin keine
Rede. Im Hintergrund des ziemlich tiefen, aber nicht sehr breiten
Lokals befanden sich nebeneinander die »Pfefferkuchen« vulgo
»Matratzen« auf den Holzpritschen, auf denen des Schlafes
bedürftige Wachtmannschaften sich ausstrecken und der Ruhe
pflegen konnten, falls sie nicht die »Wache« hatten oder gar die
Wache allarmirt wurde. Ein einfacher großer Holztisch und mehrere
Stühle, eine Stechuhr zur Controlle der Wachthabenden, an den
Wänden Pflöcke und Kleiderhalter und eine alte Wanduhr, dies war
die ganze Einrichtung der »freiwilligen Wache.« Das Allarmiren nun
ging früher, ehe die Wachtlokale mit der Polizeiwache telegraphisch
verbunden waren, allerdings nicht ohne wirklichen Allarm vor sich.
Da stürmten die Feuerglocken von den Thürmen, die Trommeln der
Communalgarden rasselten durch die Straßen und die Feuersignale
ertönten aus den Hörnern der Signalisten der Garnison und bei
Nacht erschollen in diesen Chaos von Tönen noch der dumpfe Ton
der Nachtwächterhörner, feuerrufende Menschen rannten durch die
Straßen und von allen Seiten jagten Spritzen und Zubringer,
Sturmfässer und Geräthewagen dem Ziele zu, welches von den
Thürmern durch Herausstecken von Fahnen oder bei Nacht von
Laternen als die Gegend, in welcher das Feuer ausgebrochen war,
angedeutet wurde. Die zuerst am Brandplatz ankommende Spritze
wurde prämiirt und diese Prämie haben sich die beiden freiwilligen
Corps oft genug errungen. Waren doch ihre Mannschaften mit Leib
und Seele bei der Sache und trotz des meist heiteren, geselligen
Lebens, welches sich stets auf diesen Wachen entwickelte, stand
dieselbe stets auf dem Sprunge, ihre übernommenen Pflichten auch
voll und ganz auszuführen. Daß hierbei einige Mal sogar ein
Uebereifer zu Tage trat, ist wohl entschuldbar. So hatten junge
Mannschaften des 2. Zuges, die sich Nummer und Farbe ihrer
Spritze noch nicht genau eingeprägt hatten, einst das Malheur, bei
Feuerlärm einst am hellen Tage, statt ihrer Spritze, die der
Rettungscompagnie aus dem gemeinschaftlichen Depôt an der
ersten Bürgerschule zu ziehen und mit Unterstützung einiger
hilfsbereiter Lehrbuben und Gesellen im vollen Lauf nach der
Brandstelle zu fahren und dort in Thätigkeit zu setzen. Und —
welche Freude! — ihre Spritze war die erste am Platze und erhielt
die Prämie! — Aber — welche Enttäuschung, welche Spötteleien
und gegenseitigen Vorwürfe, als das Versehen erkannt wurde und
nun die Prämie der Rettungscompagnie zufiel! —
Beim Commers, nach Legung des Grundsteines zum Denkmal
für die Völkerschlacht (Anno 1863 — Gott weiß, wann das Denkmal
selbst erbaut wird) sang die Turnerfeuerwehr:
Wir und die Rettungscompagnie —
Sahn oftmals uns kaum an
Und dennoch hatten wir uns nie
Etwas zu Leid gethan.
Woraus der Streit entstanden war,
Ist Keinem recht bekannt
Und doch verging so manches Jahr —
Eh’ er sein Ende fand etc. etc.
Heft 1.
Vorrede des Verfassers 3
Die alte innere Stadt anno 1840 5
Heiterer Rückblick auf die Steuerbeitreibung in früherer Zeit (mit Bild.) 12
Die Südvorstadt. — Ein Sonntagsausflug vor 50 Jahren 20
Das Gutenbergfest 1840 25
»Die Communalgarde rückt aus!« (mit Bild) 29
Heft 2.
Der »hohe Seeler!« 41
Kramerlehrling und Gehilfe (mit Bild) 47
Verschiedene Chronica’s von 1840—1845 58
Die letzte öffentliche Hinrichtung in Leipzig 64
Die Leipziger Sänftenträger-Compagnie (mit Bild) 71
D. L. M. 64
Heft 3.
Allerlei Chronica von 1846—49 81
Die innere Stadt zur Meßzeit vor 40 Jahren (mit Bild) 87
Der damalige Meßfremde 94
Wichsekrah (mit Bild) 98
Student und Verbindungströdeljude 108
Ein Abend bei den Harfenistinnen in Auerbachs Keller vor 40 Jahren
(mit Bild) 115
Heft 4.
Allerlei Chronica von 1850—1859 129
Die Hiersemusen! (mit Bild) 135
Der Judenbrühl 143
Unter den Buden (mit Bild) 150
Die Leipziger Meßmusikanten und das Tagebuch des Chorführers und
Leinewebers Gottfried Hahn aus Stollberg im sächs. Erzgebirge (mit
Bild) 156
Heft 5.
Allerlei Chronica von anno 1860 169
Eckensteher und Nachtwächter vor 40 Jahren (mit Bild) 171
Der alte Petersschießgraben (mit Bild) und Leipziger Originale: Dr. Ewald 180
Leipzigs Südosten vor 40 Jahren 186
In Wechselhaft (mit Bild) 193
Der Verbrechertisch in der »guten Quelle« (mit Bild) 206
Heft 6.
Allerlei Chronica 217
Die politische Lage Deutschlands zu Ende der fünfziger, bis Mitte der
sechziger Jahre des 19. Jahrhunderts 219
Das 3. deutsche Turnfest 1863 (mit Bild) 224
Feier der Völkerschlacht 1863 239
Leipzigs frühere Feuerwehrverhältnisse 241
Auf der Wache der Turnerfeuerwehr (mit Bild) 254
Verlag von Otto Lenz in Leipzig.
Bibliothek niederdeutscher Werke:
Bd. 1. Frans Essink, sien Liäwen un Driewen äs aolt Mönstersk Kind. Von
Prof. Dr. H. Landois, 1. humor. Teil: Bi Liäwtieden. 7. Aufl., illustriert. brosch.
M. 3.—, elegant geb. M. 4.—
Bd. 2. Frans Essink. 2. satyr. Teil: Nao sienen Daud. 6. Aufl., illustriert, brosch.
M. 1.80, elegant geb. M. 2.70.
Bd. 3. Frans Essink. 3. romant. Teil: Up de Tuckesburg. Brosch. M. 4.—, geb. M.
5.—.
Bd. 4. Sappholt aus Westfalens Dichterhain oder Mirza Schaffy in Holsken.
Neue humor. plattdeutsche Gedichte von Tonius Happenklang. Mit
Illustrationen, brosch. M. 1.40, elegant geb. M. 2.25.
Bd. 5/6. De westfölsche Husfrönd. Allerlei Spinnstuowengeschichten von Karl
Prümer. Bd. 1/2. brosch. à M. 1.80, geb. à M. 2.70.
Bd. 7. Rugge Wiäge. Aus dem westfälischen Bauernleben in niederdeutscher
Sprache erzählt von Ferdinand Krüger. 3. Ausgabe, brosch. M. 2.—, eleg.
geb. M. 2.80.
Bd. 8. Dä Chronika van Düöpm. Ernste und spassige Epistel mit allerlei schäune
Biller von Karl Prümer, brosch. M. 1.80, elegant geb. M. 2.70.
Bd. 9. Plattdütsche Lachpillen oder lustige Reimereien in der Mundart der
Kanonen- und Kohlenstadt Essen von Willem Täpper in Bochum. Bd. 1. 3.
Auflage. Brosch. M. 1.20, eleg. geb. M. 2.10.
Bd. 10/13. — — Band 2/5 erscheinen später.
Bd. 14/16. Hempelmann’s Smiede. Ein westfälischer Roman aus der »guten
alten Zeit« in münsterländisch-niederdeutscher Sprache von Ferdinand
Krüger. Bd. 1/3. brosch. à M. 3.—, geb. à M. 4.—
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com