first review

33
PACK: PREDICTION-BASED CLOUD BANDWIDTH AND COST REDUCTION SYSTEM INTRODUCTION Cloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing. Cloud customers pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the cloud’s scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important issue when trying to minimize costs. On sequently, cloud customers, applying a judicious use of the cloud’s resources, are motivated to use various traffic reduction techniques, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs. Traffic redundancy stems from common end-users’ activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly reduce the network cost. SCOPE OF THE PROJECT The main scope of our project PACK, a receiver-based, cloud-friendly, end-to-end TRE that is based on novel speculative

Upload: anonymous-dph8boeo

Post on 09-Sep-2015

220 views

Category:

Documents


2 download

DESCRIPTION

PACK: PREDICTION-BASED CLOUD BANDWIDTHAND COST REDUCTION SYSTEM

TRANSCRIPT

PACK: PREDICTION-BASED CLOUD BANDWIDTHAND COST REDUCTION SYSTEM

INTRODUCTIONCloud computing offers its customers an economical and convenient pay-as-you-go service model, known also as usage-based pricing. Cloud customers pay only for the actual use of computing resources, storage, and bandwidth, according to their changing needs, utilizing the clouds scalable and elastic computational capabilities. In particular, data transfer costs (i.e., bandwidth) is an important issue when trying to minimize costs. On sequently, cloud customers, applying a judicious use of the clouds resources, are motivated to use various traffic reduction techniques, in particular traffic redundancy elimination (TRE), for reducing bandwidth costs. Traffic redundancy stems from common end-users activities, such as repeatedly accessing, downloading, uploading (i.e., backup), distributing, and modifying the same or similar information items (documents, data, Web, and video). TRE is used to eliminate the transmission of redundant content and, therefore, to significantly reduce the network cost.

SCOPE OF THE PROJECTThe main scope of our project PACK, a receiver-based, cloud-friendly, end-to-end TRE that is based on novel speculative principles that reduce latency and cloud operational cost. PACK does not require the server to continuously maintain clients status, thus enabling cloud elasticity and user mobility while preserving long-term redundancy. Moreover, PACK is capable of eliminating redundancy based on content arriving to the client from multiple servers without applying a three-way handshake.

LITERATURE SURVEY

Title: EndRE: An End-System Redundancy Elimination Service for EnterprisesAuthor: Bhavish Aggarwal, Aditya Akella.Description: EndRE needs to be fast, adaptive and parsimonious in memory usage in order to opportunistically leverage resources on end hosts. Thus, we design a new fingerprinting scheme called Sample Byte that is much faster than Rabin fingerprinting while delivering similar compression gains. Unlike Rabin fingerprinting, Sample Byte can also adapt its CPU usage depending on server load. Further, we introduce optimizations to reduce server memory footprint by 33-75% compared to prior approaches. Using several terabytes of network traffic traces from11 enterprise sites, test bed experiments and a pilot deployment, we show that EndRE delivers 26%bandwidth savings on average, processes payloads at speeds of 1.5- 4Gbps, reduces end-to-end latencies by up to 30%, and translates bandwidth savings into equivalent energy savings on mobile smart phones.

Title: Pricing Cloud Bandwidth Reservations under Demand UncertaintyAuthor: Di Niu, Chen Feng, Baochun LiYear: 2012Description: In a public cloud, bandwidth is traditionally priced in a pay as-you-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a novel model of cloud bandwidth allocation and pricing when explicit bandwidth reservation is enabled. We argue that a tenants utility depends not only on its bandwidth usage, but more importantly on the portion of its demand that is satisfied with a performance guarantee. Our objective is to determine the optimal policy for pricing cloud bandwidth reservations, in order to maximize social welfare, i.e., the sum of the expected profits that can be made by all tenants and the cloud provider, even with the presence of demand uncertainty..

Title: A Low-bandwidth Network File SystemAuthor: Athicha Muthitacharoen, Benjie Chen, and David Mazi `eresDescription: This paper presents LBFS, a network file system designed for low-bandwidth networks. LBFS exploits similarities between files or versions of the same file to save bandwidth. It avoids sending data over the network when the same data can already be found in the servers file system or the clients cache. Using this technique in conjunction with conventional compression and caching, LBFS consumes over an order of magnitude less bandwidth than traditional network file systems on common workloads.

Title: Measuring the Evolution of Transport Protocols in the InternetAuthor: Alberto MedinaYear: 2005Description: In this paper we explore the evolution of both the Internets most heavily used transport protocol, TCP, and the current network environment with respect to how the networks evolution ultimately impacts end-to-end protocols. The traditional end-to-end assumptions about the Internet are increasingly challenged by the introduction of intermediary network elements (middleboxes) that intentionally or unintentionally prevent or alter the behavior of end-to-end communications.

Title: Wide-area Network Acceleration for the Developing WorldAuthor: Sunghwan Ihm1, KyoungSoo Park2, and Vivek S. Pai1Description: Wide-area network (WAN) accelerators operate by compressing redundant network traffic from point-to-point communications, enabling higher effective bandwidth. Unfortunately, while network bandwidth is scarce and expensive in the developing world, current WAN accelerators are designed for enterprise use, and are a poor fit in these environments.

MODULES Sign On Predict Bandwidth Consumer Acknowledgement Authentication File Upload File Download

MODULES DESCRIPTION

SIGN ON

Sign OnValidateCreate Account SuccessCloud DBYESNO

New User want to create an account in cloud means they have to sign on this page with providing some asked details from this page. If users provided details are all valid means account was created in the cloud. In this module many mandatory and validation controls should be used for the needs of account creation, so user must provide correct details in it.

PREDICT BANDWIDTH

Consumer SystemPredicting BandwidthProcessCloud DB

After providing the details, consumers system bandwidth will be calculated for prediction purpose of costing their usage in cloud. The calculated bandwidth range will be stored in the database.

CONSUMER ACKNOWLEDGEMENT

Acknowledgement ProcessConsumer SystemCloud DBSend Predicted RangeACK by consumerSynchronize

In this module, acknowledgement process will be processed by cloud provider side. The predicted range of consumers bandwidth has to be confirmed by consumer side. So predicted value has to be send to consumer and they will acknowledge for that means the costing will be calculate for consumer based on bandwidth.

AUTHENTICATION (Sign in)

Sign inValidateConsumer PageCloud DBYESNO

Consumer want to access their account means they have to sign in first with providing their personal user id and password. If users given authentication will be valid means the user use their account. In this module mandatory and validation controls should be used.

FILE UPLOAD

ConsumerFiles UploadProcessCloud DBConsumer want to upload their files into their cloud space means they first select the uploading files and the path is mandatory. After chosen the file path click the Upload button starts to uploading process depends upon bandwidth range of consumers system.

FILE DOWNLOAD

ConsumerFiles DownloadProcessCloud DB

Consumer want to download their files from their cloud space means they first select the downloading file from their directory is mandatory. After chosen the file click the Download button file will be starts to download to consumers system.

GIVEN INPUT AND EXPECTED OUTPUT

SIGN ONInput: Provide Details for the sign on page.Output: Cloud account creation will be success.

PREDICT BANDWIDTHInput: Consumer system will be connects with application.Output: Bandwidth of consumer system will be predicted.

CONSUMER ACKNOWLEDGEMENTInput: Consumer must synchronize with application for ACK.Output: Acknowledgement process will be completed.

AUTHENTICATIONInput: Provide user id and password.Output: If user id should be exist means access should be granted.

FILE UPLOADInput: Select the file path from consumer system.Output: File upload should be complete.FILE DOWNLOADInput: Choose the file from their cloud space.Output: File download will be complete.

TECHNIQUE USED PREDICTIVE ACKNOWLEDGEMENTProc. 1: Receiver Segment Processingif segment carries payload data thencalculate chunkif reached chunk boundary thenactivate predAttempt()end ifelse if PRED-ACK segment thenprocessPredAck()activate predAttempt()end if

Proc. 2: predAttempt()if received chunk matches one in chunk store thenif foundChain(chunk) thenprepare PREDssend single TCP ACK with PREDs according toOptions free spaceexitend ifelsestore chunklink chunk to current chainend ifsend TCP ACK only

Proc. 3: processPredAck()for all offset PRED-ACK doread data from chunk storeput data in TCP input bufferend for

HARDWARE & SOFTWARE REQUIREMENTSHARDWARE REQUIREMENTSThe Hardware requirements may serve as the basis for a contract for the implementation of the system and should therefore be a complete and consistent specification of the whole system. They are used by software engineers as the starting point for the system design. It should what the system do and not how it should be implemented. Processor: Pentium Dual Core 2.00GHZ Hard disk: 40 GB Mouse: Logitech. RAM: 2GB(minimum) Keyboard: 110 keys enhanced.

SOFTWARE REQUIREMENTSThe Software requirements document is the specification of the system. It should include both a definition and a specification of requirements. It is a set of what the system should do rather than how it should do it. The software requirements provide a basis for creating the software requirements specification. It is useful in estimating cost, planning team activities, performing tasks and tracking the teams and tracking the teams progress throughout the development activity. Operating system: Windows7 IDE: Microsoft Visual Studio .Net 2010 Front End: ASP.NET Coding Language: C# Backend: SQL Server 2008

SYSTEM DESIGNUSE CASE DIAGRAMA use case diagram is a type of behavioral diagram created from a Use-case analysis. The purpose of use case is to present overview of the functionality provided by the system in terms of actors, their goals and any dependencies between those use cases

CLASS DIAGRAMA class diagram in the UML is a type of static structure diagram that describes the structure of a system by showing the systems classes, their attributes, and the relationships between the classes. Private visibility hides information from anything outside the class partition. Public visibility allows all other classes to view the marked information. Protected visibility allows child classes to access information they inherited from a parent class.

OBJECT DIAGRAMAnobject diagramin theUnified Modeling Language(UML) is adiagram that shows a complete or partial view of the structure of a modeledsystemat a specific time. An Object diagram focuses on some particular set of object instances and attributes, and the links between the instances. A correlated set of object diagrams provides insight into how an arbitrary view of a system is expected to evolve over time. Object diagrams are more concrete than class diagrams, and are often used to provide examples, or act as test cases for the class diagrams. Only those aspects of a model that are of current interest need be shown on an object diagram.

User Sign onName: xxxPrediction bandwidthValue: xxxFile uploadFile DownloadAcknowledgementStatus: xxxCloud AccessFile name: xxx

STATE DIAGRAMAstate diagramis a type ofdiagramused incomputer scienceand related fields to describe the behavior of systems. There are many forms of state diagrams, which differ slightly and have differentsemantics. A state diagram, also called astate machinediagram or state chart diagram, is an illustration of the states an object can attain as well as the transitions between those states in the Unified Modeling Language (UML).

ACTIVITY DIAGRAMActivity diagramsare graphical representations ofworkflowsof stepwise activities and actions with support for choice, iteration and concurrency.In theUnified Modeling Language, activity diagrams can be used to describe the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control.

SEQUENCE DIAGRAMA sequence diagram in UML is a kind of interaction diagram that shows how processes operate with one another and in what order. Asequence DiagraminUnified Modeling Language(UML) is a kind ofinteraction diagramthat shows how processes operate with one another and in what order. It is a construct of aMessage Sequence Chart. A sequence diagram shows object interactions arranged in time sequence. It depicts the objects and classes involved in the scenario and the sequence of messages exchanged between the objects needed to carry out the functionality of the scenario. Sequence diagrams typically are associated with use case realizations in the Logical View of the system under development. Sequence diagrams are sometimes called event diagrams, event scenarios, andtiming diagrams.

COLLABORATION DIAGRAMThe collaboration diagram shows messages being sent between classes and object (instances). A diagram is created for each system operation that relates to the current development cycle (iteration). The concept is more than a decade old although it has been refined as modeling paradigms have evolved. A collaboration diagram resembles a flowchartthat portrays the roles, functionality and behavior of individual objects as well as the overall operation of the system inreal time. Objects are shown as rectangles with naming labels inside. These labels are preceded by colons and may be underlined.

COMPONENT DIAGRAMComponents are wired together by using anassembly connectorto connect the requiredinterfaceof one component with the provided interface of another component. This illustrates theservice consumer - service providerrelationship between the two components. When using a component diagram to show the internal structure of a component, the provided and required interfaces of the encompassing component can delegate to the corresponding interfaces of the contained components.

DATAFLOW DIAGRAMDescription: A data flow diagram (DFD) is a graphical representation of the flow of data through an information system. It differs from the flowchart as it shows the data flow instead of the control flow of the program. A data flow diagram can also be used for the visualization of data processing. The DFD is designed to show how a system is divided into smaller portions and to highlight the flow of data between those parts. Data Flow Diagram(DFD) is animportanttechnique for modeling a systems high-level detail by showing how input data is transformed to output results through a sequence of functional transformations. DFDs reveal relationships among and between the various components in a program or system. DFDs consist of four major components: entities, processes, data stores and data flow.

LEVEL 0

L0. RegisterRegistrationConsumerD. DatabaseL0.1. LoginLogin Authentication

LEVEL 1

L1. LoginLogin processConsumerD. DatabaseL1.1.Prediction Bandwidth predictionProviderL1.2. SynchronizeConnect with consumerL1.3.ACK Acknowledge consumer

LEVEL 2

L2. Access cloud File Upload/DownloadConsumerD. DatabaseL2.1.Sign out Signing out

ALL LEVEL

1. Predict Bandwidth Accept Request2. ACK ProcessACK from ConsumerProvider3. File AccessFile Upload/DownloadD. Database4. Sign outSigning off0. Sign on Create new accountConsumerD. DatabaseConsumer

E-R DIAGRAMInsoftware engineering, anentity-relationship model(ERM) is an abstract and conceptual representation ofdata. Entity-relationship modeling is a databasemethod, used to produce a type ofconceptual schemaorsemantic data modelof a system, often arelational database, and its requirements in atop-downfashion. Diagrams created by this process are calledentity-relationship diagrams,ER diagrams, orERDs.An entity-relationship (ER) diagram is a specialized graphic that illustrates therelationships between entities in a database. ER diagrams often use symbols to represent three different types of information. Boxes are commonly used to represent entities. Diamonds are normally used to represent relationships and ovals are used to represent attributes.

ConsumerProviderCloud UsersIDPasswordKeysFile DetailsConsumer detailsPredicted bandwidthAccount Details

SYSTEM ARCHITECTUREArchitecture diagram shows the relationship between different components of system. This diagram is very important to understand the overall concept of system. Architecture diagramis adiagramof asystem, in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks.They are heavily used in the engineering world inhardware design,electronic design,software design, andprocess flow diagrams.

ConsumersCloud OwnerCloud serverFiles uploadPredictionsFiles DownloadProvide service

FUTURE ENHANCEMENT

An interesting extension to this work is the statistical study of chains of chunks that would enable multiple possibilities in both the chunk order and the corresponding predictions. The system may also allow making more than one prediction at a time, and it is enough that one of them will be correct for successful traffic elimination.

MODULE DIAGRAM

Acknowledgement ProcessConsumer SystemMultiple PredictionsACK by consumerSynchronizeCloud Provider

GIVEN INPUT AND EXPECTED OUTPUTPREDICT BANDWIDTHInput: Consumer system will be connects with application.Output: Bandwidth of consumer system will be predicted for n-number of times.

ADVANTAGES The Multiple predictions are used to more accurate delivery of service to consumers from provider. This system is more reliable and reducing cost for eliminating the traffic problem from existing techniques.

APPLICATIONAmazon EC2Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. URL: http://aws.amazon.com/ec2/

CONCLUSION PACK does not require the server to continuously maintain clients status, thus enabling cloud elasticity and user mobility while preserving long-term redundancy. Moreover, PACK is capable of eliminating redundancy based on content arriving to the client from multiple servers without applying a three-way handshake.

REFERENCES

[1] E. Zohar, I. Cidon, and O. Mokryn, The power of prediction: Cloud bandwidth and cost reduction, in Proc. SIGCOMM, 2011, pp. 8697.[2] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph,R.Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, A view of cloud computing, Commun. ACM, vol. 53, no. 4, pp. 5058, 2010.[3] U. Manber, Finding similar files in a large file system, in Proc. USENIX Winter Tech. Conf., 1994, pp. 110. [4] N. T. Spring and D. Wetherall, A protocol-independent technique for eliminating redundant network traffic, in Proc. SIGCOMM, 2000, vol. 30, pp. 8795.[5] A. Muthitacharoen, B. Chen, and D. Mazires, A low-bandwidth network file system, in Proc. SOSP, 2001, pp. 174187.[6] E. Lev-Ran, I. Cidon, and I. Z. Ben-Shaul, Method and apparatus for reducing network traffic over low bandwidth links, US Patent 7636767, Nov. 2009.[7] S.Mccanne andM. Demmer, Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation, US Patent 6828925, Dec. 2004.[8] R. Williams, Method for partitioning a block of data into subblocks and for storing and communicating such subblocks, US Patent 5990810, Nov. 1999.[9] Juniper Networks, Sunnyvale, CA, USA, Application acceleration, 1996 [Online]. Available: http://www.juniper.net/us/ en/products-services/application-acceleration/[10] Blue Coat Systems, Sunnyvale, CA, USA, MACH5, 1996 [Online]. Available: http://www.bluecoat.com/products/mach5