SlideShare a Scribd company logo
2
Most read
3
Most read
26 January 2013

Cloud Computing: principles and paradigms - Part III

1

10-COMETCLOUD: AN
AUTONOMIC CLOUD ENGINE
HYUNJOO KIM and MANISH PARASHAR
Cloud Computing
Principles and Paradigms
Presented by

Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

2

Outline
• Introduction
• Architecture overview
• Autonomic behavior of CometCloud

• Overview of CometCloud-based applications
• Implementation and Evaluation

• Future Research Directions
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

Introduction
• What
• Integrates of public and private cloud
• Is a PaaS
• Why
• to enable on-demand scale-up,
scale-down
and scale-out
• How
• Cloudbursting
• Cloudbridging
Presented by Majid Hajibaba

3
26 January 2013

Cloud Computing: principles and paradigms - Part III

Architecture

Presented by Majid Hajibaba

4
26 January 2013

Cloud Computing: principles and paradigms - Part III

Automatic Cloudbursting

Presented by Majid Hajibaba

5
26 January 2013

Cloud Computing: principles and paradigms - Part III

6

Motivations on Cloudbursting
• Load Dynamics
• The computational environment must dynamically grow (or shrink)
• In response to dynamic loads
• Accuracy of the Analytics
• The required accuracy of risk analytics
• To dynamically adapt to satisfy the accuracy requirements
• Collaboration of Different Groups
• Different groups run the same app. with different dataset policies
• To satisfy their SLA.
• Economics
• Application tasks can have very heterogeneous and dynamic priorities.
• To handle heterogeneous and dynamic prov. and sched. requirements.
• Failures
• To manage failures without impacting application QoS.
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

7

Automatic Cloudbridging

Deadline-Based

Policy

Budget-Based

Workload-Based

Cloud-Bridging

Virtually Integrated working cloud
Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

Fault Tolerance

Presented by Majid Hajibaba

8
26 January 2013

Cloud Computing: principles and paradigms - Part III

9

CometCloud based apps
• VaR
• measuring the risk level of portfolios of financial instruments
• VaR calculation should be completed within the limited time
• computational requirements can change significantly
• autonomic cloudbursts
• Workload-based policy
• Image Registration
• determine the mapping between two images
• for medical informatics
• budget-based policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

10

Application Runtime on EC2

Communication Overhead

• All worker were unsecured
• Each worker ran on different instance

a: VaR

b: Image Registration

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

11

Automatic Cloudbursts Behaviors

a: Workload-specific policy

b: Workload-bounded policy

VaR using Workload-Based Policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

12

Automatic Cloudbursts Behaviors

Image Registration using Budget-Based Policy

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

13

With/Without Scheduling Agent

Presented by Majid Hajibaba
26 January 2013

Cloud Computing: principles and paradigms - Part III

END
CometCloud: An Autonomic Cloud Engine
14

More Related Content

What's hot (20)

PPTX
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Majid Hajibaba
 
PPTX
Cloud sim
Khyati Rajput
 
PPT
Distributed computing
Subhash Basistha
 
PPTX
Cloud Management Mechanisms
Mohammed Sajjad Ali
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PPTX
Cloud Computing Fundamentals
Sonia Nagpal
 
PDF
Distributed computing time
Deepak John
 
PDF
Google App Engine
Software Park Thailand
 
PPTX
Distributed Systems
Medicaps University
 
PPTX
Virtual machines and their architecture
Mrinmoy Dalal
 
PPT
distributed shared memory
Ashish Kumar
 
PPT
Cloud computing architectures
Muhammad Aitzaz Ahsan
 
PPTX
Unit i introduction to grid computing
sudha kar
 
PPT
Unit 4
Ravi Kumar
 
PPTX
Cloud Security Mechanisms
Mohammed Sajjad Ali
 
PPTX
Importance & Principles of Modeling from UML Designing
ABHISHEK KUMAR
 
PPT
Cloud computing security
Akhila Param
 
PPTX
object oriented methodologies
Amith Tiwari
 
PDF
Federated Cloud Computing - The OpenNebula Experience v1.0s
Ignacio M. Llorente
 
PPTX
Google app engine - Overview
Nathan Quach
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Majid Hajibaba
 
Cloud sim
Khyati Rajput
 
Distributed computing
Subhash Basistha
 
Cloud Management Mechanisms
Mohammed Sajjad Ali
 
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud Computing Fundamentals
Sonia Nagpal
 
Distributed computing time
Deepak John
 
Google App Engine
Software Park Thailand
 
Distributed Systems
Medicaps University
 
Virtual machines and their architecture
Mrinmoy Dalal
 
distributed shared memory
Ashish Kumar
 
Cloud computing architectures
Muhammad Aitzaz Ahsan
 
Unit i introduction to grid computing
sudha kar
 
Unit 4
Ravi Kumar
 
Cloud Security Mechanisms
Mohammed Sajjad Ali
 
Importance & Principles of Modeling from UML Designing
ABHISHEK KUMAR
 
Cloud computing security
Akhila Param
 
object oriented methodologies
Amith Tiwari
 
Federated Cloud Computing - The OpenNebula Experience v1.0s
Ignacio M. Llorente
 
Google app engine - Overview
Nathan Quach
 

Similar to Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud engine (20)

PPTX
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 
PPTX
Cloud computing_Final
Kaushik Padmanabhan
 
PDF
CloudComputing_UNIT 3.pdf
khan593595
 
PDF
CloudComputing_UNIT 3.pdf
khan593595
 
PPTX
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Majid Hajibaba
 
PDF
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Open Data Center Alliance
 
PPTX
The Fast Path to Building a Private Cloud (With Guest Speaker from Forrester ...
RightScale
 
PPTX
🌩️ Ultimate Guide to Cloud Computing.pptx
zxi09062025
 
PDF
The Cloud Computing Book The Future Of Computing Explained Douglas Comer
timeogeury
 
PPTX
cloud computing, Principle and Paradigms: 1 introdution
Majid Hajibaba
 
PDF
cloudcomputingcvbnxcvbncvbncfvbnsdfghnmcpdf
Roja40
 
PPTX
An Introduction to Cloud Computing (2009)
Robert Grossman
 
PDF
Cloud Computing: Theory and Practice 3rd Edition Dan C. Marinescu
yanedkeydan
 
DOCX
Cloud_computing Notes.docx
Bhavana Sangamnerkar
 
PPTX
Cloud computing
Aamir chouhan
 
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
iligsahuc
 
PDF
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
kulahamoragi
 
PPTX
Detailed analysis on a Berkeley view of cloud computing
MANVENDRA PRIYADARSHI
 
PDF
IT Geek Week 2016 - Introduction To Cloud Computing
Haim Ateya
 
PPTX
Building a Just-in-Time Application Stack for Analysts
Avere Systems
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 
Cloud computing_Final
Kaushik Padmanabhan
 
CloudComputing_UNIT 3.pdf
khan593595
 
CloudComputing_UNIT 3.pdf
khan593595
 
Cloud Computing Principles and Paradigms: 11 t-systems cloud-based solutions ...
Majid Hajibaba
 
Forecast 2014 Keynote: State of Cloud Migration…What's Occurring Now, and Wha...
Open Data Center Alliance
 
The Fast Path to Building a Private Cloud (With Guest Speaker from Forrester ...
RightScale
 
🌩️ Ultimate Guide to Cloud Computing.pptx
zxi09062025
 
The Cloud Computing Book The Future Of Computing Explained Douglas Comer
timeogeury
 
cloud computing, Principle and Paradigms: 1 introdution
Majid Hajibaba
 
cloudcomputingcvbnxcvbncvbncfvbnsdfghnmcpdf
Roja40
 
An Introduction to Cloud Computing (2009)
Robert Grossman
 
Cloud Computing: Theory and Practice 3rd Edition Dan C. Marinescu
yanedkeydan
 
Cloud_computing Notes.docx
Bhavana Sangamnerkar
 
Cloud computing
Aamir chouhan
 
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
iligsahuc
 
Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edi...
kulahamoragi
 
Detailed analysis on a Berkeley view of cloud computing
MANVENDRA PRIYADARSHI
 
IT Geek Week 2016 - Introduction To Cloud Computing
Haim Ateya
 
Building a Just-in-Time Application Stack for Analysts
Avere Systems
 
Ad

More from Majid Hajibaba (9)

PPTX
Storm (Distribute Stream Processing System)
Majid Hajibaba
 
PPTX
Kafka
Majid Hajibaba
 
PPTX
Apache Spark
Majid Hajibaba
 
PPTX
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Majid Hajibaba
 
PPTX
8 secure distributed data storage in cloud computing
Majid Hajibaba
 
PPTX
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Majid Hajibaba
 
PPTX
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Majid Hajibaba
 
PPTX
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Majid Hajibaba
 
PPTX
Master Thesis presentation
Majid Hajibaba
 
Storm (Distribute Stream Processing System)
Majid Hajibaba
 
Apache Spark
Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Majid Hajibaba
 
8 secure distributed data storage in cloud computing
Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 7 enhancing cloud computing environ...
Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 3 enriching the integration as a se...
Majid Hajibaba
 
Cloud Computing Principles and Paradigms: 2 migration into a cloud
Majid Hajibaba
 
Master Thesis presentation
Majid Hajibaba
 
Ad

Recently uploaded (20)

PDF
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
PDF
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
Bitkom eIDAS Summit | European Business Wallet: Use Cases, Macroeconomics, an...
Carsten Stoecker
 
PPTX
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PDF
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PDF
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
PPTX
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
WSO2
 
PDF
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 
Unlocking FME Flow’s Potential: Architecture Design for Modern Enterprises
Safe Software
 
Bridging CAD, IBM TRIRIGA & GIS with FME: The Portland Public Schools Case
Safe Software
 
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) Slides
Ravi Tamada
 
Kubernetes - Architecture & Components.pdf
geethak285
 
Bitkom eIDAS Summit | European Business Wallet: Use Cases, Macroeconomics, an...
Carsten Stoecker
 
Mastering Authorization: Integrating Authentication and Authorization Data in...
Hitachi, Ltd. OSS Solution Center.
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
ICONIQ State of AI Report 2025 - The Builder's Playbook
Razin Mustafiz
 
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
Pipeline Industry IoT - Real Time Data Monitoring
Safe Software
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
Smart Factory Monitoring IIoT in Machine and Production Operations.pptx
Rejig Digital
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
DoS Attack vs DDoS Attack_ The Silent Wars of the Internet.pdf
CyberPro Magazine
 
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
WSO2
 
5 Things to Consider When Deploying AI in Your Enterprise
Safe Software
 

Cloud Computing Principles and Paradigms: 10 comet cloud-an autonomic cloud engine

  • 1. 26 January 2013 Cloud Computing: principles and paradigms - Part III 1 10-COMETCLOUD: AN AUTONOMIC CLOUD ENGINE HYUNJOO KIM and MANISH PARASHAR Cloud Computing Principles and Paradigms Presented by Majid Hajibaba
  • 2. 26 January 2013 Cloud Computing: principles and paradigms - Part III 2 Outline • Introduction • Architecture overview • Autonomic behavior of CometCloud • Overview of CometCloud-based applications • Implementation and Evaluation • Future Research Directions Presented by Majid Hajibaba
  • 3. 26 January 2013 Cloud Computing: principles and paradigms - Part III Introduction • What • Integrates of public and private cloud • Is a PaaS • Why • to enable on-demand scale-up, scale-down and scale-out • How • Cloudbursting • Cloudbridging Presented by Majid Hajibaba 3
  • 4. 26 January 2013 Cloud Computing: principles and paradigms - Part III Architecture Presented by Majid Hajibaba 4
  • 5. 26 January 2013 Cloud Computing: principles and paradigms - Part III Automatic Cloudbursting Presented by Majid Hajibaba 5
  • 6. 26 January 2013 Cloud Computing: principles and paradigms - Part III 6 Motivations on Cloudbursting • Load Dynamics • The computational environment must dynamically grow (or shrink) • In response to dynamic loads • Accuracy of the Analytics • The required accuracy of risk analytics • To dynamically adapt to satisfy the accuracy requirements • Collaboration of Different Groups • Different groups run the same app. with different dataset policies • To satisfy their SLA. • Economics • Application tasks can have very heterogeneous and dynamic priorities. • To handle heterogeneous and dynamic prov. and sched. requirements. • Failures • To manage failures without impacting application QoS. Presented by Majid Hajibaba
  • 7. 26 January 2013 Cloud Computing: principles and paradigms - Part III 7 Automatic Cloudbridging Deadline-Based Policy Budget-Based Workload-Based Cloud-Bridging Virtually Integrated working cloud Presented by Majid Hajibaba
  • 8. 26 January 2013 Cloud Computing: principles and paradigms - Part III Fault Tolerance Presented by Majid Hajibaba 8
  • 9. 26 January 2013 Cloud Computing: principles and paradigms - Part III 9 CometCloud based apps • VaR • measuring the risk level of portfolios of financial instruments • VaR calculation should be completed within the limited time • computational requirements can change significantly • autonomic cloudbursts • Workload-based policy • Image Registration • determine the mapping between two images • for medical informatics • budget-based policy Presented by Majid Hajibaba
  • 10. 26 January 2013 Cloud Computing: principles and paradigms - Part III 10 Application Runtime on EC2 Communication Overhead • All worker were unsecured • Each worker ran on different instance a: VaR b: Image Registration Presented by Majid Hajibaba
  • 11. 26 January 2013 Cloud Computing: principles and paradigms - Part III 11 Automatic Cloudbursts Behaviors a: Workload-specific policy b: Workload-bounded policy VaR using Workload-Based Policy Presented by Majid Hajibaba
  • 12. 26 January 2013 Cloud Computing: principles and paradigms - Part III 12 Automatic Cloudbursts Behaviors Image Registration using Budget-Based Policy Presented by Majid Hajibaba
  • 13. 26 January 2013 Cloud Computing: principles and paradigms - Part III 13 With/Without Scheduling Agent Presented by Majid Hajibaba
  • 14. 26 January 2013 Cloud Computing: principles and paradigms - Part III END CometCloud: An Autonomic Cloud Engine 14

Editor's Notes

  • #4: CometCloud is an autonomic computing engine (framework) for cloud and grid environments to realize a virtual computational cloud with resizable computing capability, which integrates local computational environments and public cloud services on-demand.Specifically, CometCloud enables policy-based autonomic cloudbridging and cloudbursting. Autonomic cloudbridging enables on-the-fly integration of local computational environments (data centers, grids) and public cloud services (such as Amazon EC2 [10] and Eucalyptus [20])autonomic cloudbursting enables dynamic application scale-out to address dynamic workloads, spikes in demands, and other extreme requirements
  • #5: CometCloud is based on a peer-to-peer substrate that can span enterprise data centers, grids, and clouds. Resources can be assimilated(جذب کردن، تلفیق کردن) on-demand and on-the-fly into its peer-to-peer overlay to provide services to applications. CometCloud is composed of a programming layer, a service layer, and an infrastructure layerInfrastecture Layer:The infrastructure layer uses the Chord self-organizing overlay, and the Squid information discovery and content-based routing substrate built on top of Chord.The routing engine supports flexible content-based routing and complex querying using partial keywords, wildcards, or ranges. It guarantees that all peer nodes with data elements that match a query/message will be located. Nodes have different roles and, accordingly, different access privileges based on their credentials and capabilities.This layer also provides replication and load balancing services, and it handles dynamic joins and leaves of nodes as well as node failures.Every node keeps the replica of its successor node’s state, and it reflects changes to that as well as notify predecessor.Service Layer:The service layer provides a range of services to supports autonomics at the programming and application level. This layer supports the Linda-like tuple space coordination model.Programming Layer:The programming layer provides the basic framework for application development and management. It supports a range of paradigms including the master/worker/BOT. Masters generate tasks and workers consume them. Scheduling and monitoring of tasks are supported by the application framework.The task consistency service handles lost tasks. Even though replication is provided by the infrastructure layer, a task may be lost due to network congestion. In this case, since there is no failure, infrastructure level replication may not be able to handle it. This can be handled by the master, for example, by waiting for the result of each task for a predefined time interval and, if it does not receive the result back, regenerating the lost task.
  • #6: The goal of autonomic cloudbursts is to seamlessly and securely integrate private enterprise clouds and data centers with public utility clouds on-demand,to provide the abstraction of resizable computing capacity.CometCloud considers three types of clouds based on perceived security/trust and assigns capabilities accordingly. The first is a highly trusted, robust, and secure cloud, usually composed of trusted/secure nodes within an enterprise, which is typically used to host masters and other key (management, scheduling, monitoring) roles.The second type of cloud is one composed of nodes with such credentials—that is, the cloud of secure workers.The final type of cloud consists of casual workers. These workers are not part of the space but can access the space through the proxy and a request handler to obtain (possibly encrypted) work units.If the space needs to be scale-up to store dynamically growing workload as well as requires more computing capability, then autonomic cloudbursts target secure worker to scale up. But only if more computing capability is required, then unsecured workers are added.
  • #7: Load Dynamics. Application workloads can vary significantly. This includes the number of application tasks as well the computational requirements of a task. The computational environment must dynamically grow (or shrink) in response to these dynamics while still maintaining strict deadlines.Accuracy of the Analytics. The required accuracy of risk analytics depends on a number of highly dynamic market parameters and has a direct impact on the computational demand—for example the number of scenarios in the Monte Carlo VaR formulation. The computational environment must be able to dynamically adapt to satisfy the accuracy requirements while still maintaining strict deadlines.Collaboration of Different Groups. Different groups can run the same application with different dataset policies . Here, policy means user’s SLA bounded by their condition such as time frame, budgets, and economic models. As collaboration groups join or leave the work, the computational environment must grow or shrink to satisfy their SLA.Economics. Application tasks can have very heterogeneous and dynamic priorities and must be assigned resources and scheduled accordingly. Budgets and economic models can be used to dynamically provision computational resources based on the priority and criticality of the application task. For example, application tasks can be assigned budgets and can be assigned resources based on this budget. The computational environment must be able to handle heterogeneous and dynamic provisioning and scheduling requirements.Failures. Due to the strict deadlines involved, failures can be disastrous. The computation must be able to manage failures without impacting application quality of service, including deadlines and accuracies.
  • #8: Autonomic cloudbridging is meant to connect CometCloud and a virtual cloud which consists of public cloud, data center, and grid by the dynamic needs ofthe application.Hence, types of used clouds, the number of nodes in each cloud, and resource types of nodes should be decided according to the changing environment of the clouds and application’s resource requirements.The scheduling agent manages autonomic cloudbridging and guarantees QoS within user policies. Autonomic cloudburst is represented by changing resource provisioning not to violate defined policy. We define three types of policies:Deadline-Based. When an application needs to be completed as soon as possible, assuming an adequate budget, the maximum required workers are allocated for the job.Budget-Based. When a budget is enforced on the application, the number of workers allocated must ensure that the budget is not violated.Workload-Based. When the application workload changes, the number of workers explicitly defined by the application is allocated or released.
  • #9: it support fault-tolerance in two ways which are in the infrastructure layer and in the programming layer. The replication substrate in the infrastructure layer provides a mechanism to keep the same state as that of its successor’s state, specifically coordination space and overlay information. Every node has a local space in the service layer and a replica space in the infrastructure layer. When a tuple is inserted or extracted from the local space, the node notifies this update to its predecessor and the predecessor updates the replica space. Hence every node keeps the same replica of its successor’s local space. When a node fails, another node in the overlay detects the failure and notifies it to the predecessor of the failed node. Then the predecessor of the failed node merges the replica space into the local space, and this makes all the tuples from the failed node recovered. Also the predecessor node makes a new replica for the local space of its new successor.To address packet loss, in programming layer the master checks the space periodically and regenerates lost tasks.
  • #10: VaR for measuring the risk level of a firm’s holdings and image registration for medical informatics. VaR calculation should be completed within the limited time, and the computational requirements for the calculation can change significantly.VaR we will focus on how autonomic cloudbursts work for dynamically changing workloads. Image registration is the process to determine the linear/nonlinear mapping T between two images of the same object or similar objects that are acquired at different time.that data size of image registration is much larger than that of VaR. For image registration, because it usually needs to be completed as soon as possible within budget limit, we will focus on how CometCloud works using budget-based policy.
  • #11: Total application runtime of CometCloud-based (a) VaR and (b) image registration on Amazon EC2.If the computed data size is large and it needs more time to be completed, then workers will have less access the proxy and the communication overhead of the proxy will decrease.
  • #12: When the application workload increases (or decreases), a predefined number of workers are added (or released), based on the application workload. we defined workload-specific and workload-bounded policies. In workload-specific, a user can specify the workload that nodes are allocated or released. In workload-bounded, whenever the workload increases by more than a specified threshold, a predefined number of workers is added. Similarly, if the workload decreases by more than the specified threshold, the predefined number of workers is released.
  • #13: we set the maximum number of available nodes to 25 for TW(private datacenter) and 100 for EC2.Costs for the TW data center included hardware investment, software, electricity, and so on.initially allocated 10 nodes each from TW and EC2.Total 500 tasks.