999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Adaptive Runtime Monitoring of Service Level Agreement Violations in Cloud Computing

2022-08-23 02:15:06SamiUllahKhanBabarNazirMuhammadHanifAkhtarAliSardarAlamandUsmanHabib
Computers Materials&Continua 2022年6期

Sami Ullah Khan,Babar Nazir,Muhammad Hanif,Akhtar Ali,Sardar Alam and Usman Habib

1Department of Computer Science,COMSATS University,Abbottabad Campus,Pakistan

2Faculty of Computer Science and Engineering,Ghulam Ishaq Khan(GIK)Institute of Engineering Sciences and Technology Topi,Pakistan

3IFahja Pvt Limited,Peshawar,Pakistan

4Department of Computer Science,National University of Computer and Emerging Sciences Islamabad,Chiniot-Faisalabad Campus,Pakistan

Abstract: The cloud service level agreement (SLA) manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts, for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach (RPAA) which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e., (a) Handler and (b) Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.

Keywords:Energy consumption;penalty calculation;proactive resource allocation;service level agreement(SLA)monitoring;SLA violation detection

1 Introduction

In recent years, cloud computing revolutionized information technology and introduce new protocols for effective communication.Cloud computing is a new computing paradigm in which customers can use highly scalable IT resources or services according to their needs in a basic payper-use [1].The provision of cloud services, such as platforms, infrastructures, (processing capacity,network bandwidth,and storage)and applications have been carrying out by cloud service providers based on a predefined set of roles called quality of service properties(QoS)[2,3].The negotiation of QoS is made by an agreement called the service level agreement(SLA)[4].SLA is considered a legal contract for cloud service providers and customers to ensure QoS for cloud services.In case of breach of service quality,the defaulter has to pay a fine as specified in the SLA[5].SLA plays an important role in defining the expectations of parties,by describing the nature and type of services[6,7].Mostly web services agreements are used for the specification of main factors and structure of SLA[8].

The reliable monitoring and management of SLA are also important for cloud consumers and providers,as this is the dominant mechanism for maintaining strong business between the two parties.SLA monitoring can also help to ensure QoS applications in the cloud.The SLA monitoring system effectively detects SLA objectives and helps to provide resources and services in an adaptive way[9,10].The recent proposals,adoptions are very much influenced to detect the SLA violations either at runtime through early analysis[11]or at a testing time by pre-fix analysis[12,13].There is a problem with the above-mentioned methods because in early analysis too many messages will be sent due to which network traffic will increase and pre-fix time analysis violations will be over headed due to fix analysis time.Such parameters are ignored in most literature.Some machine learning based run-time SLA monitering methods are suggested in literature to somehow overcome or reduce the effects of the above mentioned shortcomings.In[14]the authors presents a comparision of time series(TS)and machine learning(ML)-based methods for SLA violation predictions.They concluded that ML based methods out-performed the TS based methods in predicting the service quality.A neighborhood-based approach is suggested in[15]for quality of service estimation.Comparetively,their proposed method produce optimal results.A run-time SLA violation detection method using linear regression technique is presented in[16].They used check-points for execution of composite service using recorded historical data for the prediction regression models.In[17],the authors compared two ML models,namely Na?ve Bayes and Random Forest Classifier for SLA violation prediction.They concluded that Randome Forest Classifier can efficiently predict SLA violations.

To the best of our knowledge, there are no such models that achieve the above problem with both methods as well most of the methods in the literature are either completely coupled with SLA,or use a single component for monitoring and analysis, while others only detect violation without any explanation, and some of them provide very basic information about the violation.The main contribution of our work is highlighted below:

· We have design architecture for the prediction of SLA violations at runtime and provide reserved resources proactively in case of any SLA violation prediction.

· Design and implemention of SLA based Proactive Resource Allocation Approach (SLAPRAA).This will help in legitimate user identification according to the services and will monitor the authentication of service level agreement on both sides.

· The proposed monitoring scheme is completely decoupled from SLA,which means no changes are required to monitor if SLA specification is changed.Which supports the independent core component of SLA monitoring and analysis.

· SLA-PRAA does early analysis for critical SLA metrics, due to which SLA violations are detected early and pre-fix time analysis for non-critical SLA metrics, which reduce network traffic.SLA-PRAA also calculates penalties after any violation.

· We proposed an adaptive resource allocation system to allocate IT resources for cloud applications and efforts to reduce the occurrence of SLA violations by allocating additional resources to detect the likelihood of a violation.

· If an SLA violation is detected using threshold value then SLA-PRAA provides a resource proactively to the requester.Otherwise,if a violation occurs due to insufficient resources then SLA-PRAA will handle it and calculate the penalty automatically.

The rest of the paper is organized as follows: Section 2 describes related work.Tthe problem statement is presented in Section 3.The proposed solution is explained in Section 4.Similarly, in Section 5 we have discussed the simulations and results,and finally,Section 6 concludes the paper.

2 Related Work

In the current literature,we have focused on six features related to services and monitoring policy.A brief description is presented below.

2.1 Monitor Configuration

In some models monitor is configured automatically from SLA[18–20].However,in this mechanism,the monitor works well only with concrete SLA specification,but incase of any changes in the SLA specification then the monitor modification is necessary according to the coupling.Generally,SLA is decoupled from monitor.In some models SLA is decoupled from the monitoring component by translating SLA to another document that contains the required monitoring information[3,21,22].

2.2 Monitoring Policies

In most cases,pre-fix analysis is used for SLA monitoring[10,11].In contrast,the SALMonADA[9]used an early analysis policy for SLA monitoring but they have issue in terms of energy efficiency.In [23] the author has used the monitoring policy as a time based.They have separate monitoring policies for up and downtime.

2.3 Monitoring Result Response

In several articles,the authors do not mention that how to make the report of monitoring result[3,20].In some cases,the monitoring reports are presented in a log file[24]or in the form of Application Programming Interface(API)[10,22,23].There is no standardized method because APIs and log files are two completely different representations.Due to the absence of a standard form,we cannot change monitor easily, and a problem of analyzer compatibility with monitor logs and APIs raised.The beneficial solution is that author uses a query language [25] for the reporting of monitoring results.But according to this solution monitor must deal with that query language.

2.4 The SLA Violations

Based on related work,the SLA violation can be categorise as given below:

·Detect only:Detection of SLA violation without the reason for violation[3,19,22,24].

·Incomplete explanation:in some proposals,i.e.,[21],the reason for violation is incomplete.

·Hard for human undertanding:In some proposals,i.e.,[20]the authors have provided the reason for violating the terms.But Event-Calculus is used to express monitoring results and conditions,which are not easily nderstandable by human.

·Easy and detailed: a correct explanation and easy to understand reasons for violation is presented in some proposals[7,8].

Tab.1 presents a summary of related work.We can say that there are two types of components,functional and architectural.In the functional part, few proposals cover several or none of the five issues which were defined earlier.In our proposed solution model, all these features are considered,either cover the issue as it or make some improvement in it with new strategy.A detailed description is given in the next section.

Table 1: Analysis of related work

Table 1:Continued

Table 1:Continued

3 Problem Formulation

The consumers and providers use techniques such as runtime monitoring to avoid the penalties of SLA violations.Traditional systems have the following drawbacks and require to be rectified:

· Let in Eq.(1),SLAv1,SLAv2,SLAv3,...,SLAvnare the number of total SLA violations andPTAis prefixed time analysis then

The Eq.(1) shows that the total number of SLA violations is directly proportional to prefix time analysis.Where prefix analysis is the pre-specified time after which the monitor start monitoring of non-critical parameter and send the monitoring result for analysis.While critical and non-critical parameters will decide both SLA consumer and provider in SLA agreement.

· Similarly,Let in Eq.(2)PTAis a prefixed time analysis technique andTNErepresentnot-efficient timeto analyze SLA violations then

Eq.(2)show that prefix time analysis of SLA violation is not efficient due to the occurrence of mix violation in maximum time.

· LetANErepresentearly analysis notificationandTINrepresentincrease in network trafficthen

Eq.(3) shows that early analysis of SLA violation is directly proportional to the increase in network traffic.Where early analysis is the monitoring and analysis policy in which the monitor will do monitoring on regular basis and send a notification to the analyzer for analysis.Due to network traffic,energy consumption is increased.In our observation,the current literature have the following short comings:

· No such policy of SLA monitoring to minimize the SLA violations

· No corrective method for the detected violations.

· No account or metering system of miss-detection.

The above mentioned problems are diagrammatically shown in Fig.1 i.e.,increase SLAs violation due to prefix time analysis, increase network traffic due to early analysis notification, no corrective methods for detecting violations, no account or metering system of miss-detection.In Fig.1, when the SLA is agreed upon, the mapping rules are then created by the service provider.The customer requests for provisioning of an agreed service,once it was provisioned,the run-time monitor from the agreed SLA repository load the services.Provisioning of services is based on infrastructure resources that represents the network resources and host in a data center for hosting cloud services.The metrics measure the resources by the metric agent’s,accessible by the host monitor.The pairs of visitor control values extract raw metric value indicators and periodically transmit the performance monitor and knowledge component.Upon receipt of measured steps, the execution monitor is assigned a lowlevel metric based on predefined target allocation rules allowed by SLA.The resulting allocation is stored in the affected pool mapping repository,which also contains predefined allocation rules.The performance monitor uses the assigned values to monitor the implementation of state services.In case of future threats of SLA violation,the parties will be notified by the knowledge component.

Figure 1:Monitoring and analysis of SLA violation in a cloud environment

This article intends to propose an efficient model for service level agreement monitoring,analysis over the cloud environment,which is not only suitable for cloud consumers but also very important for a cloud provider with hard and soft deadlines of service level agreement in cloud computing.

4 The Proposed Model(SLA-Proactive Resource Allocation Approach(PRAA))

In this section, we have described the SLA-PRAA platform in detail.The main component of SLA-PRAA is a controller, which plays the role of the external interface and controls the flow of internal execution of the system keeping decoupled the monitoring and analysis components from each other.Furthermore, the SLA-PRAA provides the monitoring document manager (MDM) service,which is used for generating independent monitoring document(MD)from the documents underlying structure or we say it is generated from SLA which is constructed between user and provider.This platform is capable to monitor,analyze,and handle expressive SLA violation detection by allocating resources proactively.

The SLA-PRAA has a decouple architecture which is shown in Fig.2.The detection of SLA violation is fully dependent on the selection of the right threshold.In our approach,SLA threshold targets are defined based on experiment and historical information with types of explicit applications in terms of resource consumption[25,27].The source model elements is mapped into a target domain that has formally defined semantics.Our target domain is constraint satisfaction problem[28]which is used and explain below.

Figure 2:Architecture model of SLA-PRAA

In the following subsection we describe the components of SLA-PRAA in detail.We focus on the internal function of the main components of SLA-PRAA architecture and its responsibilities.

4.1 SLA Monitor

SLA monitor starts monitoring after resource allocation,under the role defined in SLA between user and provider.When the resource is allocated to the user then the SLA template expand and the MDM generates an independent separate monitoring document from SLA for critical and noncritical SLA parameters and assigned it for monitoring.Then monitor starts two separate monitoring sessions; for the critical and non-critical parameters based on that monitoring documents.Then monitor regularly monitor critical parameters and the monitoring result is directly sent to update MDM.The other hand store monitoring results of non-critical SLA parameters are updated in the QoS repository.After a pre-fixed time(decided by the provider),the MDM is updated according to the monitoring results.The document and client id is then returned to the Controller.The next step is to analyze the monitoring result and compare it with the signed SLA.Algorithm 1 shows the overall process of SLA monitor.

4.2 SLA Analyzer

SLA analysis is to analyze the monitoring result and compare it with the given parametric value which is defined in SLA.SLA analyzer gets SLA id, monitoring document and also retrieves the monitoring document from MDM.Then compare the monitoring results with signed SLA using the following formula.

whereΔopdefines some guarantees for a set of service properties Moprepresent monitored service operation.V is a set of variables,D is a set of domains,and C is a set of constraints.

Algorithm 1:SLA Monitor Input:γ:Accepted SLA Template(username,provider name,date and time,parameter name,price,start and end time)Output:ζ:MD(parameter name and type,start and end time)and client SLA id 1:Procedure SLA Monitoring 2: Queue ←SLA 3: while(Queue is not empty)do 4: δ ←Delete first SLA from Queue 5: MDM ←δ.6: Expand δ as Memory,MIPS,BW 7: MDM generate MD for critical&Noncritical Parameter from δ 9: Monitor ←MD 10: Initiate Monitoring sessions in Monitor 11: Start session of Noncritical parameter 12: Monitor.get monitoring result 13: QoS Repository ←Monitoring Result 14: MDM ←Updated Monitoring Result after pre-fix time 15: Start session of critical parameter 16: Monitor.get monitoring result 17: MDM ←Updated Monitoring Result 18: ζ =Monitoring Result 19: SLA Analyzer().get σ 20: end While 21: return ζ;22: end procedure

The(V,D,and C)represents the values before monitoring,and(V’,D’,and C’)represents values after monitoring.If((V-V′, D-D′, C-C′)= ?) then it means that SLA is fulfilled otherwise

SLA is unfulfilled and then the reason for violations using the following formula.

The handler is then called to handle the violations,store the handler output in a repository and return the service level fulfillment to the controller.Algorithm 2 shows the overall process of SLA analyser.

Algorithm 2:SLA Analyze Input:ζ:SLA ID,MD(Parameter Name&Type,Start Time,End Time)Output:σ:Service Level Fulfillment/Unfulfillment.1: procedure SLA Analysis 2: Queue←SLA ID,MD.MD:Monitoring Document 3: while(Queue is not empty)do 4: Analyzer ←Retrieve M D 5: Unfulfillment(Δop,Mop)←→solve(V-V0,D-D0,C-C0)=? 6: Δop: Define Service Properties, Mop: Monitored Service Operation, V: Variable, V0:Variable after monitoring,D:Domain,D0:Domain after monitoring,C:Constraint,C0:Constraint after monitoring 11: if((V-V 0,D-D0,C-C0)=?)then 12: Return No violation to a controller;13 σ =Service Level Fulfillment 14: else 15: Unfulfillmentexp(Δop,Mop)=explain(V-V 0,D-D0,C-C0);16: SLU nf=explain(V-V 0,D-D0,C-C0)(SLUnf:Service Level Unfulfillment)18: SLA Violation Detector&Handler().get θ 19: σ =θ 20: end if else 21: end While 22: return σ;23: end procedure

4.3 SLA Violation Detector and Handler

This technique is called after the analysis phase when SLA violations are detected, or SLA violation occurred than SLA violation detector and handler is called to handle it according to the SLA.Based on the analysis results,after SLA violation detection or violation,the service level un-fulfillment(SLUnf) routine is called.First store SLUnf in the repository, then check a condition if a condition fulfills, means violation detected then store it in SLA-IS (Service Level Agreement Information System).Then allocate a correlative resource to the requester.Else,SLA violation occurred,then store in SLA-IS repository.Then allocate a correlative(due to which SLA detected or violated)resource to the requester and also call accounting and billing manager(A&B M),which calculate SLA violation penalties explained in the next algorithm.After the completion of the violation handler process,the result(Ω)is assigned to output(θ).In the end,return it to the proactive notification.This process is explained in Algorithm 3.

Algorithm 3:SLA Violation Detector and Handler Input:σ:SLUnf.SLUnf:Service Level Unfulfillment Output:θ:Handle violations,calculate penalties 1: procedure SLA Violation Detecting&Handling 2: Queue ←SLU nf 3: while(Queue is not empty)do 4: δ ←Delete the first SLUnf from Queue 5: ExpPand δ as Memory,MIPS,BW Violations.6: if(SLUnf ≥Req)then.Req:Requested Resource 7: SLA-IS←detected Violations.SLA-IS:SLA-Information System 8: Allocate Correlative Resource Where(M IP S ≥M IP Sreq&9: M ≥Mreq&BW ≥BWreq)10: else 11: SLA-IS ←Violations 12: Allocate Correlative Resource Where(M IP S ≥M IP Sreq&13: M ≥Mreq&BW ≥BWreq)14: A&B M().get Ω.A&B M:Accounting&Billing Manager 15: θ =Ω 16: end if 17: end While 18: return θ;19: end procedure

4.4 Accounting and Billing Manager

This technique is called when an SLA violation occurred, then accounting and billing manager start penalty calculations.Four things are required,Cost of penalty per violation(Pv)(defined in the SLA), the total time to recover violations V(t), the unit cost of violation(u), and how many times a violation occurred (NVs) (from SLA-IS).According to the situation, the penalty is calculated using the following equations:

wherePtis the total penalties,Pvis penalty per violation,NVsis Number of violations,V(t)is violation time,Puis unit cost of violation,andACris account repository.If a penalty is based on violation time,then Eq.(6) is used to calculate the penalty, else if violation depends on the number of violations then use Eq.(7) will be used.in.After this calculation, the total penalty is stored in the accounting repository.The whole process is given inAlgorithm-4.

Algorithm 4:A and B Manager Input:φ:SLUnf.SLUnf=Service Level Unfulfillment Output:Ω:calculate SLA Penalties(Continued)

?

4.5 Flow Model for SLA-PRAA

The function of SLA-PRAA is explained with the help of sequential diagram given in Fig.3.Once the client provides a WS-agreement for monitoring process to monitor its requirments.The analyzer also stores the WS-agreement independently of this approach.This WS-agreement document is also sent for generating monitoring documents by the monitoring document manager.For monitor configuration, all information is stored in monitoring document and also stored monitoring results of agreed metric.Once done,monitor start monitoring and the results are updated in the monitoring document at the endpoint after the consumption of all services.To denote specific monitoring session,client identifier is generated for SLA.If there are multiple clients of SLA-PRAA who want to monitor a unique SLA,then a multi dissimilar monitoring session is created and with different client-ids.A newly updated monitoring document is notified to a controller and the controller sent it to the analyzer for the analysis of service level fulfillment.It will then notify the service level fulfillment to the consumer.There is a loop in the monitoring and analysis session.If the WS-agreement is not fulfilled,then store the WS-agreement violations report in global-view and send corrective action to the handler manager according to the knowledge base or past experiences.If a user over user the resources,then de-allocate the resources otherwise allocate normal resources to the job and initiate account and billing manager to calculate the penalties.After this calculation total penalty is stored in the accounting repository.Notification of handling violation and penalty calculations is generated to the controller and SLAPRAA client.

Figure 3:Sequential diagram of SLA-PRAA

5 Experimental Setup

A simulation-based approach is used to analyze and evaluate our proposed SLA-PRAA model.We have implemented the proposed SLA-PRAA model in the CloudSim simulation tool.CloudSim is an open-source java-based scalable simulation tool that presenting some attributes,such as sustaining modeling service broker, allocation policies of application, provisioning of resources, and cloud computing large scale simulation environment.For a detailed discussion on CloudSim interested readers are directed to [29].We compare our result of SLA-PRAA with three existing well-known policies,i.e.,Pre-fix analysis[10,11],Early Analysis[9],and Time Based Monitoring policy(Up and Downtime)[25].A detailed description in terms of jobs submitted by one or more users and resources provided from cloud computing and the specification of the experimental environment are presented in the following sections.

5.1 Resource Modeling

Since our target system is a generic cloud computing environment, therefore, it is essential to analyze a scale virtualized data center infrastructure.However, the implementation and evaluation of the algorithms proposed in such type of infrastructure are very costly and time-consuming.In addition, the execution of large-scale repetitive experiments to analyze and compare the results of proposed algorithms is also difficult.Thus,simulation was used for the performance evaluation.We have used an extension of the Cloudsim toolset[30]and all its infrastructure provided as a platform for simulation.The adoption of Cloudsim Toolkit allows us to perform repeatable experiments for large-scale virtualized data centers.

For our infrastructure configurations, we simulate a cloud infrastructure that includes a data center with 40-100 heterogeneous physical machines [31] are installed with (10-25)G4 HP ProLiant ML110, (10-25) HP ProLiant ML110 G5, (10-25) IBM x3250 and (10-25) IBM x3550 server.The characteristics of these machines are shown in the below Tab.2.Virtual machines are assumed to correspond to four types of Amazon EC2 virtual machines,as shown in Tab.3.

5.2 Application Modeling

For our proposed policy SLA-PRAA,we have created a simulated platform for resources in the cloud, such as computing, storage, and bandwidth.To measure the performance of our proposed method, we have considered one user in our experiment, who submitted 200, 400, 600, and 800 jobs separately like (Olio Search Operations) [31] to 100 homogeneous virtual machines.We have presented a virtual machine allocation method where more correlated information among different virtual machines are considered thus, energy consumption is minimized.The price of each virtual machine instance is the same as that used by Amazon EC2 VM for different sizes.Although only four types of virtual machines are considered,our model can easily be extended to other types of virtual machine instances.

Table 2: Shows the resource specification[32]

Table 3: Shows the VMs types[33,34]

5.3 Performance Evaluation Parameters

To evaluate the performance of our proposed algorithm with an existing algorithm, we use the following QoS parameters.

5.3.1 Energy Consumption

Our first performance evaluation parameter is the energy consumption of physical resources.Greater the utilization of physical resources more energy will be consumed, but if there are fewer active physical resources,smaller energy will be consumed[35–37].We have developed and used the following equation to calculate the energy consumption of physical resources in the data center[38,39].

whereE(c)is total energy consumption,r(i)is the number of idle resources,E(max)represents the maximum energy consumed by an active idle resource,(n-r)represents the number of currently used resources and current energy consumption and CPU usage is represented byC(u).For our simulations,E(max)is assigned to 250 W,which is a normal value for each active resource.

5.3.2 SLA Detections

When SLA is violated, it will be detected first and then may or may not be violated.The phenomenon is called SLA detections.For this purpose,we have defined a suitable threshold in terms of resource provision[7].

whereSLADrepresents SLA detection,VThis a threshold value andVvais a variable value for each resource.

5.3.3 SLA Violation Miss-Detection Cost

SLA violation Miss-detection Cost is an economic factor, which is directly dependent on the agreed cost of SLA penalty for precise application.SLA Violation Miss-detection Cost is the total cost/penalty for each miss-detection due to which SLA is violated[36].This cost is calculated according to Eqs.(4)and(5).

5.3.4 Number of SLA Violation

It is the total number of SLA violations either from the user side or from the service provider.SLA is violated from the service provider side if it fails to provide the requested resources to the user on time.Similarly,SLA is violated from the user side if a user either over-uses the requested resources or does not release the resources on time[40].

whereSLAT.Vis total SLA violations,RAis the available resources,andRRis the requested resources.

5.3.5 User Satisfaction

User satisfaction is the percentage upon which a user can be satisfied with the performance of a system in terms of resource requests and resource allocations.Low number of SLA violations indicates high user satisfaction.Based on user satisfaction,cloud providers are catogeried interms of trustworthness[41,42].The user satisfication is calculated as below

where,U(s)represents user satisfaction percentage,N(a)represents the number of resources allocated andN(r)is the number of resources requested.

6 Results and Discussion

To evaluate the proposed method,we have defined and simulated the proposed work through three different scenarios.In each experiment,we have calculated the Energy Consumption,SLA detection,Cost of Miss-detection,Number of SLA violations,and User Satisfaction.We compare our result of SLA-PRAA with three existing well-known policies Pre-fix analysis[13],Early analysis[11],and Time Based Monitoring policy(Up and Downtime)[25].

6.1 Scenario 1

In scenario 1, we have executed 200, 400, 600, and 800 jobs in our simulated environment with 100 numbers of VMs and 50 hosts.This setup will help us to examine each parameter for the proposed and existing policies(SLA-PRAA,Pre-fix,and Early Time-base).The existing policies also evaluated their performance with the same number of jobs.The main objective of this scenario is to evaluate the performance parameters in terms of variations of job number, while the number of hosts and VMs remain constant.We have evaluated each performance parameter as below:

6.1.1 Energy Consumption

The objective of this assessment is to evaluate the performance parameter i.e.,Energy Consumption in terms of job variations,while the number of hosts and VMs remain constant.The average results for the proposed policy SLA-PRAA compared with existing policies in terms of energy consumption are plotted in Fig.4 which reveal that the proposed SLA-PRAA consumed 52.15%less energy from the existing policies.The reason for less energy consumption for the proposed policy SLA-PRAA is that we have used an early analysis mechanism to critical SLA metrics,due to which network traffic and the energy consumption decreased.While the existing policies use early analysis for both critical and non-critical metrics, due to which energy consumption increased.We have also used available resources by introducing the concept of reserved resources.Whereas,the reserved resources are in off condition and whenever user request does not fulfill then it makes active the reserved resources.

Figure 4:Energy consumption of monitoring systems on different numbers of Jobs

6.1.2 SLA Violation Detection

In this section the objective is to evaluate the performance parameters i.e., SLA detection in terms of job variations, while the number of hosts and VMs remain constant.In Fig.5, the average detected SLA violations are plotted on Y-axis,while the number of jobs are given on the X-axis for all compared policies.This comparison reveals that SLA-PRAA detects SLA violation on time,with 29.26% more SLA violations detected from pre-fix and time-based analysis and 20.14% more SLA violations detection from exiting time based analysis policy.We evaluate the monitoring result of SLAPRAA using the mechanism of early analysis for critical metrics only,due to which SLA violations are detected early.While the existing policies use early analysis for both critical and non-critical metrics,which increased network traffic.

Figure 5:SLA violation detection of SLA violation monitoring systems on different numbers of jobs

A trade-off between SLA violations and energy consumption is reported in[35],therefore the ratio of SLA detections increased for the proposed policy.The pre-fix and time based analysis policies sent message after a specific time duration due to which they detect less SLA violations.

6.1.3 SLA Violation

The objective of this experiment is to evaluate the performance parameter i.e., SLA violation in terms of job variations, while the number of hosts and VMs remain constant.In Fig.6 we have considered SLA violations onY-axis,while the number of jobs on theX-axisfor the compared policies.The proposed SLA-PRAA provides 46.46% fewer violations from existing policy Pre-fix analysis and also 39.18% fewer violations from Time Based analysis.The reason for a smaller number of SLA violations for the proposed policy is mainly due to the concept of reserved resources.When a system is going to violate SLA then we provide reserved resources proactively so that the system avoid SLA violation,due to which the ratio of handling the SLA increased and the ratio of SLA violation decreased.

Figure 6:SLA violation of SLA violation monitoring systems on different numbers of Jobs

6.1.4 SLA Violation Miss-Detection Cost

The objective here is to evaluate the performance parameter i.e., SLA Violation Miss-detection Cost in terms of job variations, while the number of hosts and VMs remain constant.In Fig.7 we have considered SLA Violation Miss-detection Cost onY-axis,while the number of jobs onX-axisfor the compared policies.We can see that the proposed SLA-PRAA provides 46.88%less SLA Violation Miss-detection Cost from the existing policy of Pre-fix analysis and 39.69% less from Time Based analysis.The SLA Violation Miss-detection Cost is directly dependent on SLA violations.In SLAPRAA we have used a proactive resource allocation approach in case of violation,due to which the ratio of SLA violation decreased.Therefore,total SLA Violation Miss-detection costs will be reduced by decreasing SLA violations as compared to the existing policies.

Figure 7:SLA violation penalties of SLA violation monitoring systems on different numbers of jobs

6.2 Scenario 2

In scenario 2,we have provided resources to 10,20,30,and 40 users in our simulated environment with 100 numbers of VMs,and 50 hosts.This parmeter setup will help to consider reasonable number of active users.Similarly,the other policies also evaluated their performance with the same setup.

The objective of this assessment is to evaluate the performance parameter i.e.,user satisfaction in terms of job variations,while the number of hosts and VMs remain constant.The average results for the proposed policy SLA-PRAA PRAA compared with existing policies in terms of user satisfaction are plotted in Fig.8 which reveal that the proposed SLAP-RAA provides 24.72%more user satisfaction from the pre-fix analysis and 18.29%more user satisfaction from time based analysis.The reason for more user satisfaction for the proposed policy as compared with existing policies is maily because we have used runtime monitoring mechanism with a suitable threshold.In SLA-PRAA we employed the mechanism of early analysis for critical metrics,due to which help to detect SLA violations early and used pre-fix time analysis for non-critical metrics,which help to reduce network traffic.When a system is detected to violate SLA then we provide reserved resources proactively to avoid SLA violation,due to which the ratio of handling SLA violation increased and the ratio of SLA violation decreased.Therefore,the user satisfaction increased as compared with other existing policies.

Figure 8:User Satisfaction of SLA Violation monitoring systems on the different number of users

7 Conclusion

Service level agreement is the key to ensure a service provider delivers the agreed terms of services.Cloud consumers with SLA parameters and negotiation can increase the trust level of relationship.We have presented an energy-efficient and SLA-based resource allocation policy i.e., SLA-PRAA.The performance evaluation parameters that we have considered are energy consumption,SLA detection,SLA violation misdetection cost, number of SLA violations, and user satisfaction.We compare our result of SLA-PRAA with three well-known existing policies of pre-fix analysis, early analysis,and time-based monitoring policy (up and down time).The result shows that our proposed SLAPRAA policy outperformed and more efficient than the existing policies.Simulation results revealed that SLA-PRAA has 32% less energy consumed as compared to the othe policies.The SLA-PRAA has detected 20.15% more SLA violation than pre-fix analysis and 28.49% more than time-based analysis.Simillarly,the proposed SLA-PRAA has 45.85%less SLA violations than pre-fix analysis and 37.79%less than time-based analysis.In terms of SLA violation miss-detection cost,SLA-PRAA has 45.85% less than pre-fix analysis and 37.79% less than time-based analysis.Also, the SLA-PRAA has 24.17%more user satisfaction as compared to pre-fix analysis and 18.17%more than time-base analysis.

The main limitation of the proposed policy is the exclusion of security and fault tolerance.As future work,we are planning to include these parameters in our proposed model so that a reliable and robust system can be defined.

Funding Statement:The authors received no specific funding for this study.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 日本在线免费网站| 亚洲日本韩在线观看| 亚洲人成电影在线播放| 欧美精品亚洲二区| 国产亚洲美日韩AV中文字幕无码成人| 精久久久久无码区中文字幕| 亚洲第一视频网| 久久久久人妻一区精品色奶水| 91丝袜在线观看| 国产成人亚洲日韩欧美电影| 欧美激情第一欧美在线| 亚洲欧美一级一级a| 四虎精品免费久久| 精品一区二区三区自慰喷水| 精品精品国产高清A毛片| 中国毛片网| 亚洲综合婷婷激情| 在线观看国产黄色| 无码中文字幕加勒比高清| 中国毛片网| 色婷婷亚洲综合五月| 日韩欧美高清视频| 青青国产视频| 直接黄91麻豆网站| 久久夜夜视频| 国产一区二区丝袜高跟鞋| 福利片91| 久久a级片| 99这里只有精品在线| 一本大道无码日韩精品影视| 亚洲 欧美 偷自乱 图片 | 亚洲精品动漫| 国产极品美女在线播放| 国产欧美视频在线| 2019年国产精品自拍不卡| 国产欧美亚洲精品第3页在线| 国产91丝袜在线播放动漫| 国产成人在线小视频| 制服丝袜无码每日更新| 美女内射视频WWW网站午夜| 色国产视频| 国产情侣一区二区三区| 国产日韩精品欧美一区灰| 亚洲最新地址| 全午夜免费一级毛片| 欧美日韩精品一区二区在线线| 超薄丝袜足j国产在线视频| 国产对白刺激真实精品91| 日韩免费毛片视频| 国产亚洲精品91| 亚洲中文字幕无码爆乳| 激情乱人伦| 国产女人18水真多毛片18精品 | 亚洲精品午夜无码电影网| 国产专区综合另类日韩一区 | 国产凹凸一区在线观看视频| 99热这里只有成人精品国产| 精品国产99久久| 少妇露出福利视频| 伊人久久大香线蕉成人综合网| 亚洲人成网站在线播放2019| 不卡色老大久久综合网| 茄子视频毛片免费观看| 亚洲日韩Av中文字幕无码| 亚洲日本www| 综合天天色| 国产精品免费久久久久影院无码| 超碰精品无码一区二区| 亚洲一区二区三区在线视频| 婷婷亚洲视频| 日韩无码黄色网站| Aⅴ无码专区在线观看| 国产精品精品视频| 国产福利在线免费| 亚洲啪啪网| 午夜精品区| 亚洲欧美不卡中文字幕| 亚洲天堂高清| 国产成人禁片在线观看| 日韩A∨精品日韩精品无码| 中字无码av在线电影| 亚洲αv毛片|